General
-
Target
TI1021730205.exe
-
Size
6KB
-
Sample
220922-gx6qbsdhgm
-
MD5
2f7c143029eb268cb65ce2fe51adfb2d
-
SHA1
d7d1f8ddfaa2c7395bd9453d52a89272b06bf626
-
SHA256
0be2de9cb1b88789cfcf593dde44292617d69ed8ad95e51fb586db704a234273
-
SHA512
44232d929bfd3b66adea2f1258ca7e8ecf82fa8317b2b52446aad3d86b8cc3745e75f28425045a54dce10548d33f0c0ab3de1ecd68d9633c441466753f9c4025
-
SSDEEP
96:bwR1vQas9tCRL5GbkRqtIdYB6Jo5dwtwtQ5zNt:bES9tCLYbkUtoMTLwtwm7
Static task
static1
Behavioral task
behavioral1
Sample
TI1021730205.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
TI1021730205.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5663632223:AAG5KHZDs7KWoaqTYx3lSyFlOdfD9vGegQo/sendMessage?chat_id=1443320838
Targets
-
-
Target
TI1021730205.exe
-
Size
6KB
-
MD5
2f7c143029eb268cb65ce2fe51adfb2d
-
SHA1
d7d1f8ddfaa2c7395bd9453d52a89272b06bf626
-
SHA256
0be2de9cb1b88789cfcf593dde44292617d69ed8ad95e51fb586db704a234273
-
SHA512
44232d929bfd3b66adea2f1258ca7e8ecf82fa8317b2b52446aad3d86b8cc3745e75f28425045a54dce10548d33f0c0ab3de1ecd68d9633c441466753f9c4025
-
SSDEEP
96:bwR1vQas9tCRL5GbkRqtIdYB6Jo5dwtwtQ5zNt:bES9tCLYbkUtoMTLwtwm7
-
Snake Keylogger payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-