General
-
Target
9CvlgHlOLlzWXSQ.exe
-
Size
571KB
-
Sample
221101-tvsrxaeccn
-
MD5
f1acbc2d02bd58f8f714b4128c5bc488
-
SHA1
2001ccfa7e5676be545cac9e1c57742717bef72a
-
SHA256
fe7e20398259b50b7f70c189ef64b2458c16dd04e720834a4250dcf8410ed36b
-
SHA512
cec5af8cce1ec1c8b81fac40ba3f7b411330efe5934bb7a5af5e5f44c871fd1adc6e91694bb79c269daf1d354648ba3c37406f31b21d97ac4cda7bfea7617060
-
SSDEEP
12288:awhuJCQvhzps7QK1TJpujadeIgRpXb6ShCw78h3HV:huJBs7QKfoja+RF69k8p
Static task
static1
Behavioral task
behavioral1
Sample
9CvlgHlOLlzWXSQ.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9CvlgHlOLlzWXSQ.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5714552404:AAHysyOayBgPvH4Wfw7WA_c_zBNEjp6m6IE/sendMessage?chat_id=1209608629
Targets
-
-
Target
9CvlgHlOLlzWXSQ.exe
-
Size
571KB
-
MD5
f1acbc2d02bd58f8f714b4128c5bc488
-
SHA1
2001ccfa7e5676be545cac9e1c57742717bef72a
-
SHA256
fe7e20398259b50b7f70c189ef64b2458c16dd04e720834a4250dcf8410ed36b
-
SHA512
cec5af8cce1ec1c8b81fac40ba3f7b411330efe5934bb7a5af5e5f44c871fd1adc6e91694bb79c269daf1d354648ba3c37406f31b21d97ac4cda7bfea7617060
-
SSDEEP
12288:awhuJCQvhzps7QK1TJpujadeIgRpXb6ShCw78h3HV:huJBs7QKfoja+RF69k8p
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-