General
-
Target
456ec7721eacdd6ba66a8e60c8a3d730.exe
-
Size
885KB
-
Sample
221015-tng2tsfgg2
-
MD5
456ec7721eacdd6ba66a8e60c8a3d730
-
SHA1
715df76a3d46435000afb9b945c038683ef21c62
-
SHA256
34d4de981eed5da5d62b8a4d7928ca739fbc09740b50d08736400e463e491f4b
-
SHA512
73dc2db51b1d533e8f204673ce2a63615eff142e74bc219da434ff2f938906cbbad6646a55cf263908b0f48ca201d5b294d059e3d0e2d4efd9700f0328c4142a
-
SSDEEP
12288:TTQO2iNtJ2uRN1vItfac2V6SsUdxK++FoFqXAJuQfeVQs7vaIVwUFkept:PD1gSvItfCU8K2FqXwAtaIV1
Static task
static1
Behavioral task
behavioral1
Sample
456ec7721eacdd6ba66a8e60c8a3d730.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
456ec7721eacdd6ba66a8e60c8a3d730.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5793325124:AAGHzRsq2tvLBf23l8pkEofcJjw4AQXsgAQ/sendMessage?chat_id=2086616067
Targets
-
-
Target
456ec7721eacdd6ba66a8e60c8a3d730.exe
-
Size
885KB
-
MD5
456ec7721eacdd6ba66a8e60c8a3d730
-
SHA1
715df76a3d46435000afb9b945c038683ef21c62
-
SHA256
34d4de981eed5da5d62b8a4d7928ca739fbc09740b50d08736400e463e491f4b
-
SHA512
73dc2db51b1d533e8f204673ce2a63615eff142e74bc219da434ff2f938906cbbad6646a55cf263908b0f48ca201d5b294d059e3d0e2d4efd9700f0328c4142a
-
SSDEEP
12288:TTQO2iNtJ2uRN1vItfac2V6SsUdxK++FoFqXAJuQfeVQs7vaIVwUFkept:PD1gSvItfCU8K2FqXwAtaIV1
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-