General
-
Target
1964205c3ba627bb974acd0338212de06cf442c95b7b1bd17647a2879407b3d8.exe
-
Size
331KB
-
Sample
241026-bh72ysvkhk
-
MD5
56a0eb16583c87251084dee7f8e358d2
-
SHA1
ef8f0c3826a8bfd08a670a68711146d2106886b8
-
SHA256
1964205c3ba627bb974acd0338212de06cf442c95b7b1bd17647a2879407b3d8
-
SHA512
789d4c056d7ef46da0f8614175179351221feee357af49e772ccfa4ad4180e58f1cec33d01e75eb9b0db6801ccbe80d8522f0bebda2e936e7e484944b970e30e
-
SSDEEP
768:RbLdbQe2VzEjss2yXg1ILcn0sspAgpq80Lyg1uMN0+dzsRU+eEyl:R5Q7E/pqrLy0uyz+fyl
Static task
static1
Behavioral task
behavioral1
Sample
1964205c3ba627bb974acd0338212de06cf442c95b7b1bd17647a2879407b3d8.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
1964205c3ba627bb974acd0338212de06cf442c95b7b1bd17647a2879407b3d8.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
gator3220.hostgator.com - Port:
587 - Username:
[email protected] - Password:
G!!HFpD6EwDq*nF
Targets
-
-
Target
1964205c3ba627bb974acd0338212de06cf442c95b7b1bd17647a2879407b3d8.exe
-
Size
331KB
-
MD5
56a0eb16583c87251084dee7f8e358d2
-
SHA1
ef8f0c3826a8bfd08a670a68711146d2106886b8
-
SHA256
1964205c3ba627bb974acd0338212de06cf442c95b7b1bd17647a2879407b3d8
-
SHA512
789d4c056d7ef46da0f8614175179351221feee357af49e772ccfa4ad4180e58f1cec33d01e75eb9b0db6801ccbe80d8522f0bebda2e936e7e484944b970e30e
-
SSDEEP
768:RbLdbQe2VzEjss2yXg1ILcn0sspAgpq80Lyg1uMN0+dzsRU+eEyl:R5Q7E/pqrLy0uyz+fyl
Score10/10-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-