General
-
Target
0cbf204a6759f8f27e06cc5ed7a4de3f60d1d2e620c1d39adc8b27abf726e473
-
Size
506KB
-
Sample
220623-rakvfsgaf7
-
MD5
ab5721400a5b5b47eab38db7a7dcc7cc
-
SHA1
2e4b490377d1f0427e2bff49b68b09d7ec22cf5e
-
SHA256
0cbf204a6759f8f27e06cc5ed7a4de3f60d1d2e620c1d39adc8b27abf726e473
-
SHA512
28d39f71464457853899955b9ae77f40b5774bbc1019846bfe771cc7531ac40f871db3d9ba1c848b87ea5431b6a4a03256ea34036316f072dbb850cdce35091e
Static task
static1
Behavioral task
behavioral1
Sample
0cbf204a6759f8f27e06cc5ed7a4de3f60d1d2e620c1d39adc8b27abf726e473.exe
Resource
win10-20220414-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5125489580:AAG9rJipU-Qp9bVmgyzvimlz5gpATRgg5qo/sendMessage?chat_id=5149913163
Targets
-
-
Target
0cbf204a6759f8f27e06cc5ed7a4de3f60d1d2e620c1d39adc8b27abf726e473
-
Size
506KB
-
MD5
ab5721400a5b5b47eab38db7a7dcc7cc
-
SHA1
2e4b490377d1f0427e2bff49b68b09d7ec22cf5e
-
SHA256
0cbf204a6759f8f27e06cc5ed7a4de3f60d1d2e620c1d39adc8b27abf726e473
-
SHA512
28d39f71464457853899955b9ae77f40b5774bbc1019846bfe771cc7531ac40f871db3d9ba1c848b87ea5431b6a4a03256ea34036316f072dbb850cdce35091e
Score10/10-
Snake Keylogger Payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-