General
-
Target
fishcom2021,2022.zip
-
Size
428KB
-
Sample
221018-h13nhsehb5
-
MD5
d92d722bb448707226a238747a3f6ba4
-
SHA1
efc809f6858a3c468aa518d17a619229d0999b6f
-
SHA256
53947d3249013c415585a4bd2ed6f31415f98fa69d50e1720d13c381157a75d4
-
SHA512
b00354a9be5a6f79867f5f661ed4cc5568a069da2b9878468f433c5566bef44589a2b6e8eb517c5e45e93d936c98d58b556055fb7da64c2f5b68bc82d45e7933
-
SSDEEP
12288:Q7evVWHTHt/hP+Cki1wcbfrv/mhqUXkSStUDkAb6fgRsw:Q7CVWHps0TryXIMkwyw
Static task
static1
Behavioral task
behavioral1
Sample
fishcom2021,2022.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
fishcom2021,2022.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5495243543:AAG3XPeGW7yqfXF6_EXjGSfO9SWHJTpqVsU/sendMessage?chat_id=1128973051
Targets
-
-
Target
fishcom2021,2022.exe
-
Size
523KB
-
MD5
424fe253270dbe031875b067634575e7
-
SHA1
94b9e195ccd190243f01e8370f640bf3fee30791
-
SHA256
2395d7c0f0f0a4034de2b9371519d95ca14bbb81d74afdd44111a1a5eb7497d6
-
SHA512
b47327a18ed3ee69928885f09c60b2f1d935e64ddfd7c2426932f8ad168cbedd077aa7cb42c8e4bbaaa518b5f3a7bf2ab81e32e79afd72082f46ee5bc7678f1a
-
SSDEEP
12288:R2o+Wxx9D/h5+CKi1web3rH5mhOUhM2llGytUDkAOb:f+Wxri+LrK5lZMkJ
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-