General
-
Target
2031353 Invoice.com.exe
-
Size
10KB
-
Sample
221101-h535vahcb9
-
MD5
ce826e3bff3ccdf70441b26e79f0f8cd
-
SHA1
859d677c43955b64783a98c01aedf382266f2f2f
-
SHA256
6caa80b367d2b49fa58d80f0fdce97b52c2283464331e3bd720cf89bba621fbf
-
SHA512
f9c5e5a7aa02b551ad5dbc2706c2e1c0748ed7f9534062e376e959e8759295b35d30cbef0ae47eedd8c133fe7fe52897137df3b3e5776ed234159d7e8a7102f9
-
SSDEEP
192:SDWHDAHOBzWswLqPbgJPVZyswyf8stYcFmVc03KY:SDW8HOdiLqjgJ9ZysnfptYcFmVc03K
Static task
static1
Behavioral task
behavioral1
Sample
2031353 Invoice.com.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2031353 Invoice.com.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5710787447:AAFzffo9Ok4ZQSoKM86n5fAS8hZ6CI9sZyY/sendMessage?chat_id=1672348101
Targets
-
-
Target
2031353 Invoice.com.exe
-
Size
10KB
-
MD5
ce826e3bff3ccdf70441b26e79f0f8cd
-
SHA1
859d677c43955b64783a98c01aedf382266f2f2f
-
SHA256
6caa80b367d2b49fa58d80f0fdce97b52c2283464331e3bd720cf89bba621fbf
-
SHA512
f9c5e5a7aa02b551ad5dbc2706c2e1c0748ed7f9534062e376e959e8759295b35d30cbef0ae47eedd8c133fe7fe52897137df3b3e5776ed234159d7e8a7102f9
-
SSDEEP
192:SDWHDAHOBzWswLqPbgJPVZyswyf8stYcFmVc03KY:SDW8HOdiLqjgJ9ZysnfptYcFmVc03K
-
Snake Keylogger payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-