General
-
Target
200987654234567800987654.exe
-
Size
807KB
-
Sample
211203-lrpxvabac5
-
MD5
6a92b773b8030255349aee4c6c690a6f
-
SHA1
820334495ea1dfdef35c944371abf32e26fab328
-
SHA256
d0087c8bc92d7b64c7462f2345f48da29741eaf8b0daeccaae02c52ff4233a66
-
SHA512
ec1d2fd586636f50f6013f914b59852aed4dcc24c3e9fc88dd03477de33cf87b8504522610d9152278b6caa9bdd89d832c8ea455f9c726d68aabdc51892134e7
Static task
static1
Behavioral task
behavioral1
Sample
200987654234567800987654.exe
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
200987654234567800987654.exe
Resource
win10-en-20211014
Malware Config
Targets
-
-
Target
200987654234567800987654.exe
-
Size
807KB
-
MD5
6a92b773b8030255349aee4c6c690a6f
-
SHA1
820334495ea1dfdef35c944371abf32e26fab328
-
SHA256
d0087c8bc92d7b64c7462f2345f48da29741eaf8b0daeccaae02c52ff4233a66
-
SHA512
ec1d2fd586636f50f6013f914b59852aed4dcc24c3e9fc88dd03477de33cf87b8504522610d9152278b6caa9bdd89d832c8ea455f9c726d68aabdc51892134e7
Score10/10-
Snake Keylogger Payload
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-