General
-
Target
668e30794599e3cc195cd9cb6a1110ecdf5f8c947b441132c5044b5d3b41c05d
-
Size
46KB
-
Sample
240417-p1xwlafg55
-
MD5
875735b3086231fb83adef571598116b
-
SHA1
3887c3ebfa1891661f628ebc70ebe308b9093fbf
-
SHA256
668e30794599e3cc195cd9cb6a1110ecdf5f8c947b441132c5044b5d3b41c05d
-
SHA512
4f7a22420c93ea0351d41b08dd6ae8d66efd70e8105dd1db45302a1910a1f0af6913d83659ce008e6b554a68c5625bd84dcf78f7268d7901100d71e3f2767b75
-
SSDEEP
768:rdmf8CAL/RVuV2SqpsM6/7p+6BJp0X/+efclOd8hatLaTdh2AjhDEh1uBc:wGdS/Ui9+6SZfcYDt5AjhDcuBc
Behavioral task
behavioral1
Sample
461bcd6658a32970b9bd12d978229b8d3c8c1f4bdf00688db287b2b7ce6c880e.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
461bcd6658a32970b9bd12d978229b8d3c8c1f4bdf00688db287b2b7ce6c880e.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.stpgig.com - Port:
587 - Username:
info@stpgig.com - Password:
Stpgig#Login21
https://scratchdreams.tk
Targets
-
-
Target
461bcd6658a32970b9bd12d978229b8d3c8c1f4bdf00688db287b2b7ce6c880e.exe
-
Size
129KB
-
MD5
ccfdbf07643aed4c333fad91828e4a80
-
SHA1
ccb1efa6c2ef21eb912bfdabb9a6bccb374dc248
-
SHA256
461bcd6658a32970b9bd12d978229b8d3c8c1f4bdf00688db287b2b7ce6c880e
-
SHA512
c9bd1a9ac30e941eae5acf39cff6c6b0ac8a95e7bd0c656496851f15fcce345f4cf0371df6aad709c4f72845ad496291a70d9364572abdd8da0d7444f385b6c7
-
SSDEEP
3072:jeHgpwPUTi/GIRhvudmxG9OCAXGtsddlQbgkVcsQvwvxLob3mDbY:VpmNZMm7Lqbfcb30b
Score10/10-
Snake Keylogger payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-