General
-
Target
S345678900-87654080.exe
-
Size
483KB
-
Sample
220806-hwh4baecg9
-
MD5
206304ab39a5cea4b1f0c25e20fe0d33
-
SHA1
e9861b675387e831077146f111c8355af8702743
-
SHA256
956ea990c778b7fdb74570814ad83b3eca3e2a29642d7882ae580e844a98733f
-
SHA512
151819874c0f1551546d059ba81242a8eb98739eba91258b3d83aaa48ded290ee1ff259d9fe449ff10057c7bef9f596535f74b1e73c7787adaf5ec65730977e3
Static task
static1
Behavioral task
behavioral1
Sample
S345678900-87654080.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
S345678900-87654080.exe
Resource
win10v2004-20220721-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5476629412:AAGbkcFsGq72YxKoGZjVmRBskss9nHikjMc/sendMessage?chat_id=5594190904
Targets
-
-
Target
S345678900-87654080.exe
-
Size
483KB
-
MD5
206304ab39a5cea4b1f0c25e20fe0d33
-
SHA1
e9861b675387e831077146f111c8355af8702743
-
SHA256
956ea990c778b7fdb74570814ad83b3eca3e2a29642d7882ae580e844a98733f
-
SHA512
151819874c0f1551546d059ba81242a8eb98739eba91258b3d83aaa48ded290ee1ff259d9fe449ff10057c7bef9f596535f74b1e73c7787adaf5ec65730977e3
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-