General
-
Target
4996-1090-0x0000000000AF0000-0x0000000000B14000-memory.dmp
-
Size
144KB
-
Sample
241106-tbpk5stdkk
-
MD5
38ce2ccaaf5f654792068f427d9a16d3
-
SHA1
5fbfaefcbc0f0211a6428cb442245d979f459d01
-
SHA256
d63ecfb4ce224ed9a4862402b65f72d406ea7973ae6cf4857294ab0db2298c88
-
SHA512
678229d3cb74056e114c984a3f2c5caa7cb1a210ee2e1c25e3860ae85b0dba20c58e52eafedff74fc6b6c4108803038b4105696828646d7046353e82c6cf7ef0
-
SSDEEP
3072:k8asEqyUoO1H/IyCvjQEJ0vDbbs2QJsYXwv8YvDbY:jEqyUL1H/XbbyO7b
Behavioral task
behavioral1
Sample
4996-1090-0x0000000000AF0000-0x0000000000B14000-memory.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4996-1090-0x0000000000AF0000-0x0000000000B14000-memory.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
gator3220.hostgator.com - Port:
587 - Username:
[email protected] - Password:
D#Hm!GgJ,?fO;gfR
Targets
-
-
Target
4996-1090-0x0000000000AF0000-0x0000000000B14000-memory.dmp
-
Size
144KB
-
MD5
38ce2ccaaf5f654792068f427d9a16d3
-
SHA1
5fbfaefcbc0f0211a6428cb442245d979f459d01
-
SHA256
d63ecfb4ce224ed9a4862402b65f72d406ea7973ae6cf4857294ab0db2298c88
-
SHA512
678229d3cb74056e114c984a3f2c5caa7cb1a210ee2e1c25e3860ae85b0dba20c58e52eafedff74fc6b6c4108803038b4105696828646d7046353e82c6cf7ef0
-
SSDEEP
3072:k8asEqyUoO1H/IyCvjQEJ0vDbbs2QJsYXwv8YvDbY:jEqyUL1H/XbbyO7b
Score10/10-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-