General
-
Target
Swift Copy.rar
-
Size
474KB
-
Sample
220930-mfylaadcb4
-
MD5
13ea1837676c03d74547e34ab233ff16
-
SHA1
6e68b2f0101c40fa9e2d296c128b4f7644d952b8
-
SHA256
3826a8affaa7e2d56f666b053c2d047a5e72db484c56fdd8a4dd5b0bd7646510
-
SHA512
3157d2e0629a2f095fc6a690306ad33c89dd8ea58916231ef5d46902ef630e1e286d68c660114a4bdf9945157e9b6235d0dedc4f781d18ea7ad353315663efaf
-
SSDEEP
12288:InhuHzutYswulazh37D3zfmT7SGj7rZ0mC7Op:IhuHmdGh33zfcGcvZ0mkOp
Static task
static1
Behavioral task
behavioral1
Sample
Swift Copy.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Swift Copy.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5495243543:AAG3XPeGW7yqfXF6_EXjGSfO9SWHJTpqVsU/sendMessage?chat_id=1128973051
Targets
-
-
Target
Swift Copy.exe
-
Size
809KB
-
MD5
fe640080409e16221716866bb65a463c
-
SHA1
1a4141f72426b226312be73311a5c22b5f75f55e
-
SHA256
53c8a7b825f04fd38afdcdef29b21c18fa2407597277de780252a18b733af1d2
-
SHA512
b6197680f5d6c36422cbb35fc50eb2a4263fdc8a8d89014cc32d1dee2935673cc0387dabdf7cfdd59ffd2be0fd2684115288f0a0fe0faa4de68a3632febef414
-
SSDEEP
12288:67R8VFAxQRADqjJ5n6fd5hJWs8C8E1Hj3NseFQ3d:6uVFXjr6fdcs8E1Hj3NseFw
Score10/10-
Snake Keylogger payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-