General
-
Target
New ORUFkqYaRVYJqKoVK.exe
-
Size
860KB
-
Sample
221017-g9g8habaar
-
MD5
d7a0b8fe1026fc6c74730e8a1ec34d1a
-
SHA1
4b3f5f36cc5ba5cdad3593323740a526aa2a14b8
-
SHA256
0a22a2255fdbaba55a3d1901e74e709968f363362e2902c5a16bfa6a86e90481
-
SHA512
14139632f0252ead40534c39459cba7f50e241528a92874f1bbfa559b41627faa1d27e4e232e5215e966b427231b18b01779d46c91d0c83a37fabe32b2910f4c
-
SSDEEP
12288:dw/fEuzZLHRIml3pJQLwsi/zctnEI+3yiJDpk7OdHOrCE+Rg6j9uVKFkhw:OFLlYLws6YtnmR/k7OVO4RS
Static task
static1
Behavioral task
behavioral1
Sample
New ORUFkqYaRVYJqKoVK.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
New ORUFkqYaRVYJqKoVK.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5788931871:AAEfkw_P98L88KrFlXGZzJolFlQrpqGegLg/sendMessage?chat_id=5649714338
Targets
-
-
Target
New ORUFkqYaRVYJqKoVK.exe
-
Size
860KB
-
MD5
d7a0b8fe1026fc6c74730e8a1ec34d1a
-
SHA1
4b3f5f36cc5ba5cdad3593323740a526aa2a14b8
-
SHA256
0a22a2255fdbaba55a3d1901e74e709968f363362e2902c5a16bfa6a86e90481
-
SHA512
14139632f0252ead40534c39459cba7f50e241528a92874f1bbfa559b41627faa1d27e4e232e5215e966b427231b18b01779d46c91d0c83a37fabe32b2910f4c
-
SSDEEP
12288:dw/fEuzZLHRIml3pJQLwsi/zctnEI+3yiJDpk7OdHOrCE+Rg6j9uVKFkhw:OFLlYLws6YtnmR/k7OVO4RS
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-