General

  • Target

    f68fb7a0ec1333b4e5447ee274f97857b2b0051b654ab664e8aaff870d84d9ba.exe

  • Size

    130KB

  • MD5

    904c56a013a3ab2747d436bce1f7727d

  • SHA1

    4373b0f97602d459dd7580b3452d37924be48c2d

  • SHA256

    f68fb7a0ec1333b4e5447ee274f97857b2b0051b654ab664e8aaff870d84d9ba

  • SHA512

    7467f6573e79d7afdfb59bc1ec7767b0d408de2c5407205973c4b360e54e669a3c7fc9decf3c67f12498708d9f26a9a39e013f1f0dc71bd7ba6762f48db59b8b

  • SSDEEP

    3072:fZHRYTcxL41EAamulCfiJtX1b0j9lrCwvHx0fgbY:3YTcR41REV1bu04b

Score
10/10

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    valleycountysar.org
  • Port:
    26
  • Username:
    [email protected]
  • Password:
    iU0Ta!$K8L51
C2

http://103.130.147.85

Signatures

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • f68fb7a0ec1333b4e5447ee274f97857b2b0051b654ab664e8aaff870d84d9ba.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections