General
-
Target
2e7e24e750feec58b36081d802f9940ef63a7f926d5b95b103f6636dfc6a1195
-
Size
896KB
-
Sample
221006-f4bcbsgde6
-
MD5
d4650d3c458ea370b949bceb48d36cf9
-
SHA1
c43e59433922e99d15b60e2747ce6b09062e641d
-
SHA256
2e7e24e750feec58b36081d802f9940ef63a7f926d5b95b103f6636dfc6a1195
-
SHA512
16a4c66472e3e57a29618d4dc9836015c70145bd0f6738782c72d64c18486c94120a1be3a85403832d81548c91367cb2fe842405d5c1990380c1ae59419d544b
-
SSDEEP
12288:dH0+SRweoJb3XV/WAOhuDHxOwJHrEZZ6foTdeioIjW4ve:6fwbnFPxOGLuZMcDrW4ve
Static task
static1
Behavioral task
behavioral1
Sample
2e7e24e750feec58b36081d802f9940ef63a7f926d5b95b103f6636dfc6a1195.exe
Resource
win10-20220812-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5321688653:AAEI2yqGrOA_-sRZ3xaqutrexraSgFa0AnA/sendMessage?chat_id=5048077662
Targets
-
-
Target
2e7e24e750feec58b36081d802f9940ef63a7f926d5b95b103f6636dfc6a1195
-
Size
896KB
-
MD5
d4650d3c458ea370b949bceb48d36cf9
-
SHA1
c43e59433922e99d15b60e2747ce6b09062e641d
-
SHA256
2e7e24e750feec58b36081d802f9940ef63a7f926d5b95b103f6636dfc6a1195
-
SHA512
16a4c66472e3e57a29618d4dc9836015c70145bd0f6738782c72d64c18486c94120a1be3a85403832d81548c91367cb2fe842405d5c1990380c1ae59419d544b
-
SSDEEP
12288:dH0+SRweoJb3XV/WAOhuDHxOwJHrEZZ6foTdeioIjW4ve:6fwbnFPxOGLuZMcDrW4ve
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-