General
-
Target
8f11652e58d9d7ae390cbb476120892e87dcfc4b15a24e8ead9a8f3120fdaaeb.exe
-
Size
2.9MB
-
Sample
241207-dhsclsykfl
-
MD5
f0db130e6b63a94f3d3b33e43cbfbf55
-
SHA1
198ff2e9a846f3e39d970dc20711fb758406b5cb
-
SHA256
8f11652e58d9d7ae390cbb476120892e87dcfc4b15a24e8ead9a8f3120fdaaeb
-
SHA512
f8fe4bf340960a7f3adc44d0d789d36430d56d71d36f68d34a792f8a44fd2f28e9c87b3bbd8551d5200c62f9ed204d3357008aecb4e8dd556d787b749fb3d3de
-
SSDEEP
49152:dm4TovB6xQlMtR0mG6bGvO2kHlVqWP6tisEbX+aJMcTy:dIJfA5b6to+uTy
Static task
static1
Behavioral task
behavioral1
Sample
8f11652e58d9d7ae390cbb476120892e87dcfc4b15a24e8ead9a8f3120fdaaeb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8f11652e58d9d7ae390cbb476120892e87dcfc4b15a24e8ead9a8f3120fdaaeb.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
gator3220.hostgator.com - Port:
587 - Username:
[email protected] - Password:
empS#w!TZyEMPX(#ExgT38s
Targets
-
-
Target
8f11652e58d9d7ae390cbb476120892e87dcfc4b15a24e8ead9a8f3120fdaaeb.exe
-
Size
2.9MB
-
MD5
f0db130e6b63a94f3d3b33e43cbfbf55
-
SHA1
198ff2e9a846f3e39d970dc20711fb758406b5cb
-
SHA256
8f11652e58d9d7ae390cbb476120892e87dcfc4b15a24e8ead9a8f3120fdaaeb
-
SHA512
f8fe4bf340960a7f3adc44d0d789d36430d56d71d36f68d34a792f8a44fd2f28e9c87b3bbd8551d5200c62f9ed204d3357008aecb4e8dd556d787b749fb3d3de
-
SSDEEP
49152:dm4TovB6xQlMtR0mG6bGvO2kHlVqWP6tisEbX+aJMcTy:dIJfA5b6to+uTy
Score10/10-
Snake Keylogger payload
-
Snakekeylogger family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-