General
-
Target
2b72e1cae965997ea7c5613ce0a3f5463bf5fd5afd41be8dd4bf339ac31e9465.exe
-
Size
1.3MB
-
Sample
241129-dc76wa1kaw
-
MD5
41f94a2922f60e3f0cdd9d1725b6c4ba
-
SHA1
fc13832ecd4376a29fe17ba084b4e14bcc0f38e3
-
SHA256
2b72e1cae965997ea7c5613ce0a3f5463bf5fd5afd41be8dd4bf339ac31e9465
-
SHA512
b4fe70f9c4bc259e3e60ffff4c38380be95d5ae54e979f1a984244501162d9248acc780ab3efe263c78861cb38e0515f9a4324ce1f989e129cc70e897a07e785
-
SSDEEP
24576:C/44oDaSKj+Cg0bueqz0HarxPIKEg6YW+4Xj4HxB0J4H444l:e4jahueerCKZ6B8Hx24H444l
Static task
static1
Behavioral task
behavioral1
Sample
2b72e1cae965997ea7c5613ce0a3f5463bf5fd5afd41be8dd4bf339ac31e9465.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2b72e1cae965997ea7c5613ce0a3f5463bf5fd5afd41be8dd4bf339ac31e9465.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
gator3220.hostgator.com - Port:
587 - Username:
[email protected] - Password:
JOYEss..&UK55@@!! - Email To:
[email protected]
Targets
-
-
Target
2b72e1cae965997ea7c5613ce0a3f5463bf5fd5afd41be8dd4bf339ac31e9465.exe
-
Size
1.3MB
-
MD5
41f94a2922f60e3f0cdd9d1725b6c4ba
-
SHA1
fc13832ecd4376a29fe17ba084b4e14bcc0f38e3
-
SHA256
2b72e1cae965997ea7c5613ce0a3f5463bf5fd5afd41be8dd4bf339ac31e9465
-
SHA512
b4fe70f9c4bc259e3e60ffff4c38380be95d5ae54e979f1a984244501162d9248acc780ab3efe263c78861cb38e0515f9a4324ce1f989e129cc70e897a07e785
-
SSDEEP
24576:C/44oDaSKj+Cg0bueqz0HarxPIKEg6YW+4Xj4HxB0J4H444l:e4jahueerCKZ6B8Hx24H444l
Score10/10-
Snake Keylogger payload
-
Snakekeylogger family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-