General
-
Target
e81ff60c955d9f232d4812a68ef4335f204be923d6aa75c5d309e8fe76eed1ed.exe
-
Size
130KB
-
Sample
240408-jpt3nscc56
-
MD5
eb9d9bc525bf2cfd5a566ff1939a65d8
-
SHA1
d1d9c33251db984f86a31033d94e365ff2787ad6
-
SHA256
e81ff60c955d9f232d4812a68ef4335f204be923d6aa75c5d309e8fe76eed1ed
-
SHA512
2a41f25fd63148ed2eb2e1b26ae2c889a09c93bcad8ad5ecdf1e7e8deeeceecc030d6a05c38bd520c49d68219721016e62f6d4dfb35407db8fc53b0264239335
-
SSDEEP
3072:AA1JAirk7zoewGuynWGMUdNL9blyFFAsQ2wvxLO4LygbY:1AirqzoP6Vd9bKv4L7b
Behavioral task
behavioral1
Sample
e81ff60c955d9f232d4812a68ef4335f204be923d6aa75c5d309e8fe76eed1ed.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e81ff60c955d9f232d4812a68ef4335f204be923d6aa75c5d309e8fe76eed1ed.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
snakekeylogger
https://scratchdreams.tk
Extracted
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
EbxKZL@2
Targets
-
-
Target
e81ff60c955d9f232d4812a68ef4335f204be923d6aa75c5d309e8fe76eed1ed.exe
-
Size
130KB
-
MD5
eb9d9bc525bf2cfd5a566ff1939a65d8
-
SHA1
d1d9c33251db984f86a31033d94e365ff2787ad6
-
SHA256
e81ff60c955d9f232d4812a68ef4335f204be923d6aa75c5d309e8fe76eed1ed
-
SHA512
2a41f25fd63148ed2eb2e1b26ae2c889a09c93bcad8ad5ecdf1e7e8deeeceecc030d6a05c38bd520c49d68219721016e62f6d4dfb35407db8fc53b0264239335
-
SSDEEP
3072:AA1JAirk7zoewGuynWGMUdNL9blyFFAsQ2wvxLO4LygbY:1AirqzoP6Vd9bKv4L7b
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-