General
-
Target
product Portfolio.exe
-
Size
269KB
-
Sample
220806-hvx6vaecf8
-
MD5
b9277f54b3aac9e4a23d0f09fbbb9327
-
SHA1
553cefa73bc6ddbf1f82c4e8665c4eb4f031953e
-
SHA256
280f622b9ab5cc5931427ada8c4f0976344fa63bfc82204cb7dfdc098a066717
-
SHA512
af01fb0a5c87ec29a2f7b79f1bbca044c3bfa27e38f95e53564f7be345467a5b235e060246c16797e746ba19a6ce0e2d86606d721a3ca7665b38592cfd56f18e
Static task
static1
Behavioral task
behavioral1
Sample
product Portfolio.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
product Portfolio.exe
Resource
win10v2004-20220721-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5200365593:AAGRpC_tWb3avAayYSeKw5B6h5VRh7b19kU/sendMessage?chat_id=1482312326
Targets
-
-
Target
product Portfolio.exe
-
Size
269KB
-
MD5
b9277f54b3aac9e4a23d0f09fbbb9327
-
SHA1
553cefa73bc6ddbf1f82c4e8665c4eb4f031953e
-
SHA256
280f622b9ab5cc5931427ada8c4f0976344fa63bfc82204cb7dfdc098a066717
-
SHA512
af01fb0a5c87ec29a2f7b79f1bbca044c3bfa27e38f95e53564f7be345467a5b235e060246c16797e746ba19a6ce0e2d86606d721a3ca7665b38592cfd56f18e
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-