General
-
Target
P O -82YWU8HNQMWK.exe
-
Size
756KB
-
Sample
220920-qc8hvschg3
-
MD5
d0fc8acab7b14959a21de8c923c8a70c
-
SHA1
b0a7c0355d2e4e41f0977f00e8072eeb70c674d0
-
SHA256
ffc51f2ef0542e31be26668f49bf65a719ea827188707a83ca5421d2ad8b6fbc
-
SHA512
28f0c196678b25fa7d4e9dd23c025497fd9a03a3d11d0c72062b25f34b2569f5d5320f96410f25f17b2f7d6bfe8f1de5eff5cc34a893b7209c72153b39b596e0
-
SSDEEP
12288:LlM9v4jxXf1AZFFhtTV8rUzDEThhUVsDwlMbqjJ5n:yv41feh8rMDElhUeDwlNjr
Static task
static1
Behavioral task
behavioral1
Sample
P O -82YWU8HNQMWK.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
P O -82YWU8HNQMWK.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5227573794:AAECZBnQSxLs0aOVsV2wnclC6-WKnxPpi_k/sendMessage?chat_id=5217421430
Targets
-
-
Target
P O -82YWU8HNQMWK.exe
-
Size
756KB
-
MD5
d0fc8acab7b14959a21de8c923c8a70c
-
SHA1
b0a7c0355d2e4e41f0977f00e8072eeb70c674d0
-
SHA256
ffc51f2ef0542e31be26668f49bf65a719ea827188707a83ca5421d2ad8b6fbc
-
SHA512
28f0c196678b25fa7d4e9dd23c025497fd9a03a3d11d0c72062b25f34b2569f5d5320f96410f25f17b2f7d6bfe8f1de5eff5cc34a893b7209c72153b39b596e0
-
SSDEEP
12288:LlM9v4jxXf1AZFFhtTV8rUzDEThhUVsDwlMbqjJ5n:yv41feh8rMDElhUeDwlNjr
Score10/10-
Snake Keylogger payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-