General
-
Target
54445.exe
-
Size
530KB
-
Sample
221027-t86wpacgf2
-
MD5
0231f92908b15f6c44c84ec6c1092fe2
-
SHA1
deafb2bf99a796b87230aabefe5f45eae1852174
-
SHA256
cbab45963c125f9320b3cdd66e41f341894d4045d0d1739c98eff440ff68efc4
-
SHA512
34f7b43ffac7559b76cee35a0bb25c7c168043b6b417f280376a08d49a92d9fb80db3bdd39f7ee5b3666131748d9196665445d9d7cae47342b25df1e9d9fbb42
-
SSDEEP
12288:pQImP666h7hosvIWvJ/GvgsSm8t/WF7GY9nMo:pBvDh+vuhOFV
Static task
static1
Behavioral task
behavioral1
Sample
54445.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
54445.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5793325124:AAGHzRsq2tvLBf23l8pkEofcJjw4AQXsgAQ/sendMessage?chat_id=2086616067
Targets
-
-
Target
54445.exe
-
Size
530KB
-
MD5
0231f92908b15f6c44c84ec6c1092fe2
-
SHA1
deafb2bf99a796b87230aabefe5f45eae1852174
-
SHA256
cbab45963c125f9320b3cdd66e41f341894d4045d0d1739c98eff440ff68efc4
-
SHA512
34f7b43ffac7559b76cee35a0bb25c7c168043b6b417f280376a08d49a92d9fb80db3bdd39f7ee5b3666131748d9196665445d9d7cae47342b25df1e9d9fbb42
-
SSDEEP
12288:pQImP666h7hosvIWvJ/GvgsSm8t/WF7GY9nMo:pBvDh+vuhOFV
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-