General
-
Target
083a6acdf46560666ca764a49d0e22427706ce63df285a0896e159ff17b5891f.exe
-
Size
126KB
-
Sample
241031-cf2ylaxbla
-
MD5
7e7eed81d6cdbfdbffc813d82883a344
-
SHA1
83f6991305ea05977e19bf07dbb2a3844045f9bd
-
SHA256
083a6acdf46560666ca764a49d0e22427706ce63df285a0896e159ff17b5891f
-
SHA512
64f471b3c1ba0b234c19a858fed504a8d9483b156cad12d923a184e12a312a462d1705bd84298aad22a224ce51ae597020386e717d5690b21999003ca8d122b5
-
SSDEEP
3072:ijoOxu9go/b/1O5iItBEpZNlxoDSrah/F15xN:Mo99bT/1OVtazDxaSuhvz
Static task
static1
Behavioral task
behavioral1
Sample
083a6acdf46560666ca764a49d0e22427706ce63df285a0896e159ff17b5891f.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
083a6acdf46560666ca764a49d0e22427706ce63df285a0896e159ff17b5891f.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
gator3220.hostgator.com - Port:
587 - Username:
[email protected] - Password:
nr!^%FSRH4kX@KM
Targets
-
-
Target
083a6acdf46560666ca764a49d0e22427706ce63df285a0896e159ff17b5891f.exe
-
Size
126KB
-
MD5
7e7eed81d6cdbfdbffc813d82883a344
-
SHA1
83f6991305ea05977e19bf07dbb2a3844045f9bd
-
SHA256
083a6acdf46560666ca764a49d0e22427706ce63df285a0896e159ff17b5891f
-
SHA512
64f471b3c1ba0b234c19a858fed504a8d9483b156cad12d923a184e12a312a462d1705bd84298aad22a224ce51ae597020386e717d5690b21999003ca8d122b5
-
SSDEEP
3072:ijoOxu9go/b/1O5iItBEpZNlxoDSrah/F15xN:Mo99bT/1OVtazDxaSuhvz
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-