General
-
Target
a341597a3593fea8c72ae01c56c656eb789ad7f9fc6ab9c4153433ab60066be5.exe
-
Size
1.0MB
-
Sample
231127-wgfxasbc9x
-
MD5
a2cdefaa9027ded0b82f1554c79b3781
-
SHA1
bc2b570e3097fff585f71cb806204b8b527af9da
-
SHA256
a341597a3593fea8c72ae01c56c656eb789ad7f9fc6ab9c4153433ab60066be5
-
SHA512
00fe318f71db27f31e54ec91bda44d7fb537537dff54aaeb5d4299043f857936b6545c5a08911f4fdb8326576062a15ee2b5ebfd7b2c60aca82e18306cbf38f0
-
SSDEEP
12288:vHNjzMJr5EPvfCU1oAECJgsdlUgN9Ie4ryagV:PNjzMTW3CmEVsAg/Ie47gV
Static task
static1
Behavioral task
behavioral1
Sample
a341597a3593fea8c72ae01c56c656eb789ad7f9fc6ab9c4153433ab60066be5.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
a341597a3593fea8c72ae01c56c656eb789ad7f9fc6ab9c4153433ab60066be5.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.belt-tech.com.my - Port:
587 - Username:
[email protected] - Password:
Beltechpg@1234 - Email To:
[email protected]
Targets
-
-
Target
a341597a3593fea8c72ae01c56c656eb789ad7f9fc6ab9c4153433ab60066be5.exe
-
Size
1.0MB
-
MD5
a2cdefaa9027ded0b82f1554c79b3781
-
SHA1
bc2b570e3097fff585f71cb806204b8b527af9da
-
SHA256
a341597a3593fea8c72ae01c56c656eb789ad7f9fc6ab9c4153433ab60066be5
-
SHA512
00fe318f71db27f31e54ec91bda44d7fb537537dff54aaeb5d4299043f857936b6545c5a08911f4fdb8326576062a15ee2b5ebfd7b2c60aca82e18306cbf38f0
-
SSDEEP
12288:vHNjzMJr5EPvfCU1oAECJgsdlUgN9Ie4ryagV:PNjzMTW3CmEVsAg/Ie47gV
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-