General
-
Target
Payment 05-08-22.exe
-
Size
341KB
-
Sample
220806-hw7fxaech8
-
MD5
54827a45e0eec3ecb462066523d63e6c
-
SHA1
7c7a87429e9533c14497c799c085825ca68f5b4a
-
SHA256
ee81c7498b4343a8c9353957777a74cf2f615b3b0d8a09846eb06fcde700de63
-
SHA512
0c305685f8f3f1df118fcd75bac38c6c28205ea2690576231f5ae4df69b6d9ea685ec29d1fc1bcaa5c2309d94053addcccab8078cf77a30748ed5ccb32036116
Static task
static1
Behavioral task
behavioral1
Sample
Payment 05-08-22.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
Payment 05-08-22.exe
Resource
win10v2004-20220721-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5410455012:AAE1SHAu8VAoPkLETxqziCFDZfyqp8DD7SA/sendMessage?chat_id=2008035906
Targets
-
-
Target
Payment 05-08-22.exe
-
Size
341KB
-
MD5
54827a45e0eec3ecb462066523d63e6c
-
SHA1
7c7a87429e9533c14497c799c085825ca68f5b4a
-
SHA256
ee81c7498b4343a8c9353957777a74cf2f615b3b0d8a09846eb06fcde700de63
-
SHA512
0c305685f8f3f1df118fcd75bac38c6c28205ea2690576231f5ae4df69b6d9ea685ec29d1fc1bcaa5c2309d94053addcccab8078cf77a30748ed5ccb32036116
Score10/10-
Snake Keylogger payload
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-