General
-
Target
350c6c70aa15c43da19ee0cb68f7bb945520503b59b09dfb310feb4300513a56
-
Size
898KB
-
Sample
221012-tfgq4aadfr
-
MD5
e95b44f1f00637d521dfe2ffcd2951f3
-
SHA1
38bc1ebb095d0060eb04e92d7d41880c0a5692cf
-
SHA256
350c6c70aa15c43da19ee0cb68f7bb945520503b59b09dfb310feb4300513a56
-
SHA512
4eace6e4f7eb2c5818133f281004a7b38c4c466474d6a75038c515cfa79c3ba02607f28c00e06f147f937c5172bba3393720d10a702f3cbbb5e5620971be5799
-
SSDEEP
12288:pl1z7jwQcXwCbw1po5xpd06iu/UrWttekLhXELBKftotnm:fxw//YyN/vvtt9L2Ift0
Static task
static1
Behavioral task
behavioral1
Sample
350c6c70aa15c43da19ee0cb68f7bb945520503b59b09dfb310feb4300513a56.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
350c6c70aa15c43da19ee0cb68f7bb945520503b59b09dfb310feb4300513a56.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5310184099:AAGxqu0IL8tjOF6Eq6x2u0gfcHhvuxRwfLU/sendMessage?chat_id=5350445922
Targets
-
-
Target
350c6c70aa15c43da19ee0cb68f7bb945520503b59b09dfb310feb4300513a56
-
Size
898KB
-
MD5
e95b44f1f00637d521dfe2ffcd2951f3
-
SHA1
38bc1ebb095d0060eb04e92d7d41880c0a5692cf
-
SHA256
350c6c70aa15c43da19ee0cb68f7bb945520503b59b09dfb310feb4300513a56
-
SHA512
4eace6e4f7eb2c5818133f281004a7b38c4c466474d6a75038c515cfa79c3ba02607f28c00e06f147f937c5172bba3393720d10a702f3cbbb5e5620971be5799
-
SSDEEP
12288:pl1z7jwQcXwCbw1po5xpd06iu/UrWttekLhXELBKftotnm:fxw//YyN/vvtt9L2Ift0
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-