General
-
Target
d5a1c1d4f0dcb307b693d75f759251c84999a1f885d8e4486dbe844402a7fe84
-
Size
1.0MB
-
Sample
220930-ta18jsehgr
-
MD5
095b613eb266abe973e2b6f808de1961
-
SHA1
bae2c1ac2687c7f82a0723c25e54816df513c750
-
SHA256
d5a1c1d4f0dcb307b693d75f759251c84999a1f885d8e4486dbe844402a7fe84
-
SHA512
1931ab5375de1a0fd34aa05f8af0c8ed15ed8c4cbc7fe01e2d5ea0998c9b5dbc5e08feb067883a42930eba69415efaa2da20443854ef8cd901ff6a551d6aaeb1
-
SSDEEP
24576:x2x6jEWJzKoImcPTtET49syHrp0Mzqn00v:46jwoI/bKUK+p0MzH0
Static task
static1
Behavioral task
behavioral1
Sample
d5a1c1d4f0dcb307b693d75f759251c84999a1f885d8e4486dbe844402a7fe84.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$ - Email To:
[email protected]
https://api.telegram.org/bot5321688653:AAEI2yqGrOA_-sRZ3xaqutrexraSgFa0AnA/sendMessage?chat_id=5048077662
Targets
-
-
Target
d5a1c1d4f0dcb307b693d75f759251c84999a1f885d8e4486dbe844402a7fe84
-
Size
1.0MB
-
MD5
095b613eb266abe973e2b6f808de1961
-
SHA1
bae2c1ac2687c7f82a0723c25e54816df513c750
-
SHA256
d5a1c1d4f0dcb307b693d75f759251c84999a1f885d8e4486dbe844402a7fe84
-
SHA512
1931ab5375de1a0fd34aa05f8af0c8ed15ed8c4cbc7fe01e2d5ea0998c9b5dbc5e08feb067883a42930eba69415efaa2da20443854ef8cd901ff6a551d6aaeb1
-
SSDEEP
24576:x2x6jEWJzKoImcPTtET49syHrp0Mzqn00v:46jwoI/bKUK+p0MzH0
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-