General
-
Target
tmp
-
Size
773KB
-
Sample
220930-pznxaseeap
-
MD5
0c935dc0bfbf3ad156b36bd0bee1673d
-
SHA1
855b1880cd36e83806aad24266d84b6818475af7
-
SHA256
5e07cd8489f4f15978a6a6aa3046eb6ea92b8b122797ceb97dd207eb88cd5a0b
-
SHA512
17573b4b367390a6a000d3eb3d5993d4641934b92a2764782030f06d6f705da0e2cc707de525007ab441abcdb9216cf2b8e006c0c2e6d6fa2f9e25e99a4a6950
-
SSDEEP
12288:i+Aa1bHUzWtoV5I70A2a1RqqJg2Y1XP5tAWwqWuKfjZ7Oc5LP/6VB+6LZ:ieHU6tR4A2uRqqJgJ1/5WWJWz4Sg
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$ - Email To:
[email protected]
https://api.telegram.org/bot5321688653:AAEI2yqGrOA_-sRZ3xaqutrexraSgFa0AnA/sendMessage?chat_id=5048077662
Targets
-
-
Target
tmp
-
Size
773KB
-
MD5
0c935dc0bfbf3ad156b36bd0bee1673d
-
SHA1
855b1880cd36e83806aad24266d84b6818475af7
-
SHA256
5e07cd8489f4f15978a6a6aa3046eb6ea92b8b122797ceb97dd207eb88cd5a0b
-
SHA512
17573b4b367390a6a000d3eb3d5993d4641934b92a2764782030f06d6f705da0e2cc707de525007ab441abcdb9216cf2b8e006c0c2e6d6fa2f9e25e99a4a6950
-
SSDEEP
12288:i+Aa1bHUzWtoV5I70A2a1RqqJg2Y1XP5tAWwqWuKfjZ7Oc5LP/6VB+6LZ:ieHU6tR4A2uRqqJgJ1/5WWJWz4Sg
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-