General
-
Target
Purchase Order No.KL0093 Athens Branch.exe
-
Size
1.0MB
-
Sample
220928-tqtteahfar
-
MD5
49f36f87be737a71e153cdb06d32736a
-
SHA1
a62012c8bc5f66f36228bc6b746381805f54412f
-
SHA256
19365435590c1225513df7750eddec47c42680761a0fb946e10085d3aab90b3f
-
SHA512
cb73a6505203b432864f2ce6155285d81b443889e96796bab65c2ff97b3c8508da26816b8217453ecfccc8c6e56794351a971656eb668ec0b6bd88fca5458a2f
-
SSDEEP
12288:ipPXpPweBdKmPz88e4C1V4C+suCqbxEBPAsV7vPr/8dRvPxNd27BcPYNzHlZ:ip/p7/qJ1V4jlbWdP5vr8dZxNXP0HT
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order No.KL0093 Athens Branch.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Purchase Order No.KL0093 Athens Branch.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5486243913:AAG6Jm7sGsjD2aGDej_Ex1CsQwqX0Sb4YT0/sendMessage?chat_id=1760125104
Targets
-
-
Target
Purchase Order No.KL0093 Athens Branch.exe
-
Size
1.0MB
-
MD5
49f36f87be737a71e153cdb06d32736a
-
SHA1
a62012c8bc5f66f36228bc6b746381805f54412f
-
SHA256
19365435590c1225513df7750eddec47c42680761a0fb946e10085d3aab90b3f
-
SHA512
cb73a6505203b432864f2ce6155285d81b443889e96796bab65c2ff97b3c8508da26816b8217453ecfccc8c6e56794351a971656eb668ec0b6bd88fca5458a2f
-
SSDEEP
12288:ipPXpPweBdKmPz88e4C1V4C+suCqbxEBPAsV7vPr/8dRvPxNd27BcPYNzHlZ:ip/p7/qJ1V4jlbWdP5vr8dZxNXP0HT
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-