General
-
Target
Hjhkcx.scr
-
Size
2.0MB
-
Sample
220806-hwkl5sbhbm
-
MD5
8ba4d8afe4e893752efe87e60ca906c7
-
SHA1
3ef4ad6579868be2cb954a02003e5838e7195d50
-
SHA256
29748957e43758e0a59ec98a377f55bbdd4f25fdd4ba10bae8d6ec997f580d1e
-
SHA512
687932d3ad807589e254b3c89e7f77cc8d10e1275c05e0673fa26c58de037979cb75263cc3b1b8ded890b65508f94274255e3b76d828a9a73afb374c7295b4ad
Static task
static1
Behavioral task
behavioral1
Sample
Hjhkcx.scr
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
Hjhkcx.scr
Resource
win10v2004-20220721-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5599749594:AAH_jG8ISPD--cSrsStzuOm8r68iVeJzryU/sendMessage?chat_id=2054148913
Targets
-
-
Target
Hjhkcx.scr
-
Size
2.0MB
-
MD5
8ba4d8afe4e893752efe87e60ca906c7
-
SHA1
3ef4ad6579868be2cb954a02003e5838e7195d50
-
SHA256
29748957e43758e0a59ec98a377f55bbdd4f25fdd4ba10bae8d6ec997f580d1e
-
SHA512
687932d3ad807589e254b3c89e7f77cc8d10e1275c05e0673fa26c58de037979cb75263cc3b1b8ded890b65508f94274255e3b76d828a9a73afb374c7295b4ad
Score10/10-
Snake Keylogger payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-