General
-
Target
137ad88b1c43f6aa6f01b9b8a7b15027387d501dbe7af463a7b639f5abf3f116.exe
-
Size
1.4MB
-
Sample
241119-cnr4csyekg
-
MD5
9c6de69b3f4bd16dc76a37fd8a50aea4
-
SHA1
a5c6f87a637a6e5ffd073dc90a3cbfa0591160c1
-
SHA256
137ad88b1c43f6aa6f01b9b8a7b15027387d501dbe7af463a7b639f5abf3f116
-
SHA512
255dbc20c850d91eaccbe338b99ef1e144af703e6bc88c70f8d8d0f6dd2089cbbc6ddb2f8b4dccd6770c75bc21176ae41566eb995d58645ae0a86d42ef1d3841
-
SSDEEP
12288:Yx093lfiCZNsgg/iUZ0vXTWyzopB2QrJ30Bme47vAn+TbzeB:YIiFzj+vXhzop5rJ3gmYSe
Static task
static1
Behavioral task
behavioral1
Sample
137ad88b1c43f6aa6f01b9b8a7b15027387d501dbe7af463a7b639f5abf3f116.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
137ad88b1c43f6aa6f01b9b8a7b15027387d501dbe7af463a7b639f5abf3f116.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
gator3220.hostgator.com - Port:
587 - Username:
[email protected] - Password:
G!!HFpD@N*]*nF
Targets
-
-
Target
137ad88b1c43f6aa6f01b9b8a7b15027387d501dbe7af463a7b639f5abf3f116.exe
-
Size
1.4MB
-
MD5
9c6de69b3f4bd16dc76a37fd8a50aea4
-
SHA1
a5c6f87a637a6e5ffd073dc90a3cbfa0591160c1
-
SHA256
137ad88b1c43f6aa6f01b9b8a7b15027387d501dbe7af463a7b639f5abf3f116
-
SHA512
255dbc20c850d91eaccbe338b99ef1e144af703e6bc88c70f8d8d0f6dd2089cbbc6ddb2f8b4dccd6770c75bc21176ae41566eb995d58645ae0a86d42ef1d3841
-
SSDEEP
12288:Yx093lfiCZNsgg/iUZ0vXTWyzopB2QrJ30Bme47vAn+TbzeB:YIiFzj+vXhzop5rJ3gmYSe
Score10/10-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-