General
-
Target
a71def2e25368c12469a158add24786ce11a2b6b89afd81006cc283edb604e9c
-
Size
615KB
-
Sample
231123-cdrpvafe28
-
MD5
e391897dc66445e6bfddc73898c4a99d
-
SHA1
1155aad83d426c3e80c7cd46dd72621340bedcc3
-
SHA256
a71def2e25368c12469a158add24786ce11a2b6b89afd81006cc283edb604e9c
-
SHA512
1e38fc30f0c4f33e583c6961d9744c1f5ad113f3fe806dc562c57cb9cd4ce5a9e0e939b57dd6d1375501cf95de8d948162d0012492a2d4a75051486aea047e84
-
SSDEEP
12288:ixLcJf0Gdq5W8ZZrVEw5o5Ahbjx64TEib0TbL3FQeQ:itcJZQbxTXgGbCFu
Static task
static1
Behavioral task
behavioral1
Sample
product List.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
product List.exe
Resource
win10v2004-20231025-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.belt-tech.com.my - Port:
587 - Username:
[email protected] - Password:
Beltechpg@1234 - Email To:
[email protected]
Targets
-
-
Target
product List.exe
-
Size
1.0MB
-
MD5
92ea59584143492a9997cb726c50cc2f
-
SHA1
e921858b54293bf976396bfe4ab73fd5dfe6db1d
-
SHA256
09f3ffc4cf39c48f84b8eac7c29a49f9c1c576fd7c804a18374ee0e93d69bc37
-
SHA512
289d9e48cad3c994fd66ea9563e6563b8f897f92fe283c234e307b336fea757de19201dbafa8a1f843657891514a53dbae15d25e91d72c7aa2b6091687510f16
-
SSDEEP
12288:fFNlzMJr5jdij0pkTiS4+cN1283rsnBACiTt28yNa3yagV:tNlzMTjdu0MiS4+YTABAC4t3MafgV
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-