General
-
Target
tmp
-
Size
866KB
-
Sample
220909-n3j7vagae8
-
MD5
802e5cccd06f899eac41a3946408161b
-
SHA1
9d0fad0078c96c3ea4c5e9d0c4e449310e0bce5f
-
SHA256
a315f9c05c2c54565cc0d5615bd79b4c25012fa64d72758cb53f2bac2af78556
-
SHA512
3a364ad6220c7c58fca7b4158e2fc627649da10d36f48114e4c18c098a668970314eacc66b4bf601b6ff77634dd17e62acbbe4aa751c1ec588f51735601ed23d
-
SSDEEP
12288:2/RYlxF4M9nLDJLfJEGlYsJqw1bOkb2h6apTWO:RbF4shVlYoqQb7yvpCO
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5523020974:AAHw91wZ4lFXSikGhiv2A-o3CzmAt30RREg/sendMessage?chat_id=1972606022
Targets
-
-
Target
tmp
-
Size
866KB
-
MD5
802e5cccd06f899eac41a3946408161b
-
SHA1
9d0fad0078c96c3ea4c5e9d0c4e449310e0bce5f
-
SHA256
a315f9c05c2c54565cc0d5615bd79b4c25012fa64d72758cb53f2bac2af78556
-
SHA512
3a364ad6220c7c58fca7b4158e2fc627649da10d36f48114e4c18c098a668970314eacc66b4bf601b6ff77634dd17e62acbbe4aa751c1ec588f51735601ed23d
-
SSDEEP
12288:2/RYlxF4M9nLDJLfJEGlYsJqw1bOkb2h6apTWO:RbF4shVlYoqQb7yvpCO
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-