General
-
Target
161a834887fbcd4334a80bbfe0f12135c141e785a33074994c5a4c1058c6a2af
-
Size
777KB
-
Sample
220929-bw2gbsheb7
-
MD5
b4634dbcb38847a4f97956a76e1cf068
-
SHA1
dbaccfa3fbc11e9d76b3832780a19599376242e1
-
SHA256
161a834887fbcd4334a80bbfe0f12135c141e785a33074994c5a4c1058c6a2af
-
SHA512
bd6f105772af1b11b97eb2bd0917dadc3cffb9cee6175adfae24f06c1f0c5a645e4e77071ab09cf4bd14958caa86d32e47af3298b4fb12afbd657eb014b8fea6
-
SSDEEP
12288:+MtxoEqUBL6AZjJM4M7wukhqC94PIcQNyrZM1/9EX8T:+M/Jq+6Aj+7TSq5wcg
Static task
static1
Behavioral task
behavioral1
Sample
161a834887fbcd4334a80bbfe0f12135c141e785a33074994c5a4c1058c6a2af.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
dubaioilandgas.xyz - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$ - Email To:
[email protected]
https://api.telegram.org/bot5321688653:AAEI2yqGrOA_-sRZ3xaqutrexraSgFa0AnA/sendMessage?chat_id=5048077662
Targets
-
-
Target
161a834887fbcd4334a80bbfe0f12135c141e785a33074994c5a4c1058c6a2af
-
Size
777KB
-
MD5
b4634dbcb38847a4f97956a76e1cf068
-
SHA1
dbaccfa3fbc11e9d76b3832780a19599376242e1
-
SHA256
161a834887fbcd4334a80bbfe0f12135c141e785a33074994c5a4c1058c6a2af
-
SHA512
bd6f105772af1b11b97eb2bd0917dadc3cffb9cee6175adfae24f06c1f0c5a645e4e77071ab09cf4bd14958caa86d32e47af3298b4fb12afbd657eb014b8fea6
-
SSDEEP
12288:+MtxoEqUBL6AZjJM4M7wukhqC94PIcQNyrZM1/9EX8T:+M/Jq+6Aj+7TSq5wcg
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-