General
-
Target
NEW_PO#671928273.exe
-
Size
1.0MB
-
Sample
220920-jspmcsfhfq
-
MD5
415954ffa0e22511ace125a0dac71ecc
-
SHA1
b6ed3636a9c47cc4bddcb3615853234a095c1b5d
-
SHA256
e0cd24aec11fb4e4cdcd1e5932ca75ff201ab1087be33d3a3f94ed8e18a4eff2
-
SHA512
4c0e6dbce8027535701b08d926c446bedf070d55193323d9f707a4a508d597b69f0f8e8739b6150dafadb5381b5fadff6436c259483d65d115b0c64f974d3708
-
SSDEEP
12288:UycPeCXhywOPFbM2jG5zGg47eNJluhGGYswhPs9Um:JcPeGYyEQzGg0ipGYsP
Static task
static1
Behavioral task
behavioral1
Sample
NEW_PO#671928273.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
NEW_PO#671928273.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5587666659:AAG8NrrXJQs__dhk8nLJBFOspz2my8OVpX0/sendMessage?chat_id=5569775004
Targets
-
-
Target
NEW_PO#671928273.exe
-
Size
1.0MB
-
MD5
415954ffa0e22511ace125a0dac71ecc
-
SHA1
b6ed3636a9c47cc4bddcb3615853234a095c1b5d
-
SHA256
e0cd24aec11fb4e4cdcd1e5932ca75ff201ab1087be33d3a3f94ed8e18a4eff2
-
SHA512
4c0e6dbce8027535701b08d926c446bedf070d55193323d9f707a4a508d597b69f0f8e8739b6150dafadb5381b5fadff6436c259483d65d115b0c64f974d3708
-
SSDEEP
12288:UycPeCXhywOPFbM2jG5zGg47eNJluhGGYswhPs9Um:JcPeGYyEQzGg0ipGYsP
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-