General
-
Target
fd4ad2ebf91114b28b1ba94a0e4e7e07d5ec88a9b964c5a38aba321e2787ca78.exe
-
Size
224KB
-
Sample
240712-zka21azapr
-
MD5
e8782adb13fa42cf95099f5ed6c0dd91
-
SHA1
ee9b1f41020e8c775d2a2a699174761f532d8e39
-
SHA256
fd4ad2ebf91114b28b1ba94a0e4e7e07d5ec88a9b964c5a38aba321e2787ca78
-
SHA512
bee3f064b4888ede895a1a6eb6a36f895bc712d43a169798198f2efd075dc890997c2d25ee01efe1e24c28ed2def0fbe46fc5d4569a8b83671850e69d57deec9
-
SSDEEP
6144:xDKW1Lgbdl0TBBvjc/FeJVpPxDGtnC1tvVb4:Bh1Lk70Tnvjc2PxDGcJ4
Static task
static1
Behavioral task
behavioral1
Sample
fd4ad2ebf91114b28b1ba94a0e4e7e07d5ec88a9b964c5a38aba321e2787ca78.exe
Resource
win10-20240404-en
Malware Config
Extracted
snakekeylogger
https://scratchdreams.tk
Targets
-
-
Target
fd4ad2ebf91114b28b1ba94a0e4e7e07d5ec88a9b964c5a38aba321e2787ca78.exe
-
Size
224KB
-
MD5
e8782adb13fa42cf95099f5ed6c0dd91
-
SHA1
ee9b1f41020e8c775d2a2a699174761f532d8e39
-
SHA256
fd4ad2ebf91114b28b1ba94a0e4e7e07d5ec88a9b964c5a38aba321e2787ca78
-
SHA512
bee3f064b4888ede895a1a6eb6a36f895bc712d43a169798198f2efd075dc890997c2d25ee01efe1e24c28ed2def0fbe46fc5d4569a8b83671850e69d57deec9
-
SSDEEP
6144:xDKW1Lgbdl0TBBvjc/FeJVpPxDGtnC1tvVb4:Bh1Lk70Tnvjc2PxDGcJ4
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-