General
-
Target
33df72386c5aaf42b65b0b253f454db5
-
Size
768KB
-
Sample
220922-2e1ftacec2
-
MD5
33df72386c5aaf42b65b0b253f454db5
-
SHA1
05d1a3f852eeeebbea5c7b6d2daa877821869f2d
-
SHA256
eb5756410f2af864043bf16fa2f8ff75f635a761423b13bcd31e5dd90b99f67b
-
SHA512
abe7191f5127662a95c72a946cfdba71816acfccbc40df58e1c482de43d537a455c871603be264bbcbe6ac02136b606692fb1284df933ae64126ce2c4ad9fc6d
-
SSDEEP
12288:uWGU2mv7ppDRbLUkTf8h3lC6I4Sv9Q+m5uVMQqk+fM3VrPnYd8c5YJ9/Y0xhIZ3X:uWbvQw6I1v9Qb0+fM3VnYdX5wHIZ
Static task
static1
Behavioral task
behavioral1
Sample
12220173387_20220825_13363111_Hesap0zeti.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
12220173387_20220825_13363111_Hesap0zeti.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5310184099:AAGxqu0IL8tjOF6Eq6x2u0gfcHhvuxRwfLU/sendMessage?chat_id=5350445922
Targets
-
-
Target
12220173387_20220825_13363111_Hesap0zeti.exe
-
Size
1.1MB
-
MD5
8c0c9c9ce087cdab90db2db5cd29a194
-
SHA1
eb3436fd076e2854b1d5d6957ed32d907bd03d9c
-
SHA256
03d111de04e5af8d0a126034372cc928d8e3ac78ff8e81a0972a35c5eeddce34
-
SHA512
324eb5f28dfae912bd7a5b49a6aabeee3ed34d0a5765efca428554c6792e5a33d6d03cb969360ae01671c48c6c9b2a85af51f4ab736a1b3b7d4a027936b15a3d
-
SSDEEP
12288:Ce2L7HCkEYKfg9MTmmshNN5uhJ6+JQIUbr22TBEFlptV5FU778Z:D2fHCNc9g7sDNa6+JQIEr0tV5O3
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-