General
-
Target
922ff7b2589cfa1d6a8dcd706bc294be4d4cb4d9baf02df5717d121097ab1859.exe
-
Size
353KB
-
Sample
240927-mgsfnazhpg
-
MD5
631691dca7abc573a0cc911b2ddca40e
-
SHA1
0ddc497bb233cda946e320378cde5e5cc507eb72
-
SHA256
922ff7b2589cfa1d6a8dcd706bc294be4d4cb4d9baf02df5717d121097ab1859
-
SHA512
4a94910b35a95038ba787095970ee32281011021f3cd33066bc8b350c2b1824e1f67a303492fbaae41e9872e75667325e3a4b8d759dce3a79105a00a09782dd9
-
SSDEEP
768:BiHqbOcbd5LGOcccCM8AMx9m24IeGFfRhQg2ZzEjss2VSg1I1cn0sspAgpq8hLy8:oHqbbJGwrThRhQ7qPpqOLy0uyL+fS
Static task
static1
Behavioral task
behavioral1
Sample
922ff7b2589cfa1d6a8dcd706bc294be4d4cb4d9baf02df5717d121097ab1859.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
922ff7b2589cfa1d6a8dcd706bc294be4d4cb4d9baf02df5717d121097ab1859.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
gator3220.hostgator.com - Port:
587 - Username:
[email protected] - Password:
Zg^!Zy[?IKrs99@soltan
Targets
-
-
Target
922ff7b2589cfa1d6a8dcd706bc294be4d4cb4d9baf02df5717d121097ab1859.exe
-
Size
353KB
-
MD5
631691dca7abc573a0cc911b2ddca40e
-
SHA1
0ddc497bb233cda946e320378cde5e5cc507eb72
-
SHA256
922ff7b2589cfa1d6a8dcd706bc294be4d4cb4d9baf02df5717d121097ab1859
-
SHA512
4a94910b35a95038ba787095970ee32281011021f3cd33066bc8b350c2b1824e1f67a303492fbaae41e9872e75667325e3a4b8d759dce3a79105a00a09782dd9
-
SSDEEP
768:BiHqbOcbd5LGOcccCM8AMx9m24IeGFfRhQg2ZzEjss2VSg1I1cn0sspAgpq8hLy8:oHqbbJGwrThRhQ7qPpqOLy0uyL+fS
Score10/10-
Snake Keylogger payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-