General
-
Target
d53e3ef9fae38384b9cfbd817bd75865.exe
-
Size
126KB
-
Sample
220706-s9xhzaedhk
-
MD5
d53e3ef9fae38384b9cfbd817bd75865
-
SHA1
af3bf205ad4b51615901128d50cb10988496e565
-
SHA256
23ebed8ff1f6bbc93df436e7fafcbd0580751b8b628761342b9bc8a96790a9a0
-
SHA512
1f7e477e689cef7c483190bc366f1d26d97a66da93332df0551b4ef8595e52adde0c27e2ff56d3ab21b03b54fd1c9644bdbf53ff8141b26f19fd4d68301e1e1a
Static task
static1
Behavioral task
behavioral1
Sample
d53e3ef9fae38384b9cfbd817bd75865.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
d53e3ef9fae38384b9cfbd817bd75865.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5166529015:AAHmXMIWF4K9IarF05CZj5gCu_oVRj3zFHc/sendMessage?chat_id=5170122971
Targets
-
-
Target
d53e3ef9fae38384b9cfbd817bd75865.exe
-
Size
126KB
-
MD5
d53e3ef9fae38384b9cfbd817bd75865
-
SHA1
af3bf205ad4b51615901128d50cb10988496e565
-
SHA256
23ebed8ff1f6bbc93df436e7fafcbd0580751b8b628761342b9bc8a96790a9a0
-
SHA512
1f7e477e689cef7c483190bc366f1d26d97a66da93332df0551b4ef8595e52adde0c27e2ff56d3ab21b03b54fd1c9644bdbf53ff8141b26f19fd4d68301e1e1a
Score10/10-
Snake Keylogger Payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-