General
-
Target
c3cddff3ce93f42d93f3134e6c55eec6f0e75f25256ed91b5d8a6e90cecaf8cc_dump.exe
-
Size
224KB
-
Sample
240711-3g5c8a1gkg
-
MD5
e8782adb13fa42cf95099f5ed6c0dd91
-
SHA1
ee9b1f41020e8c775d2a2a699174761f532d8e39
-
SHA256
fd4ad2ebf91114b28b1ba94a0e4e7e07d5ec88a9b964c5a38aba321e2787ca78
-
SHA512
bee3f064b4888ede895a1a6eb6a36f895bc712d43a169798198f2efd075dc890997c2d25ee01efe1e24c28ed2def0fbe46fc5d4569a8b83671850e69d57deec9
-
SSDEEP
6144:xDKW1Lgbdl0TBBvjc/FeJVpPxDGtnC1tvVb4:Bh1Lk70Tnvjc2PxDGcJ4
Static task
static1
Behavioral task
behavioral1
Sample
c3cddff3ce93f42d93f3134e6c55eec6f0e75f25256ed91b5d8a6e90cecaf8cc_dump.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c3cddff3ce93f42d93f3134e6c55eec6f0e75f25256ed91b5d8a6e90cecaf8cc_dump.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
snakekeylogger
https://scratchdreams.tk
Targets
-
-
Target
c3cddff3ce93f42d93f3134e6c55eec6f0e75f25256ed91b5d8a6e90cecaf8cc_dump.exe
-
Size
224KB
-
MD5
e8782adb13fa42cf95099f5ed6c0dd91
-
SHA1
ee9b1f41020e8c775d2a2a699174761f532d8e39
-
SHA256
fd4ad2ebf91114b28b1ba94a0e4e7e07d5ec88a9b964c5a38aba321e2787ca78
-
SHA512
bee3f064b4888ede895a1a6eb6a36f895bc712d43a169798198f2efd075dc890997c2d25ee01efe1e24c28ed2def0fbe46fc5d4569a8b83671850e69d57deec9
-
SSDEEP
6144:xDKW1Lgbdl0TBBvjc/FeJVpPxDGtnC1tvVb4:Bh1Lk70Tnvjc2PxDGcJ4
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-