General
-
Target
File.js
-
Size
1024KB
-
Sample
221125-wl91yagg3w
-
MD5
e6ec998371e8e87c4fd54fab0753efd6
-
SHA1
78ffb07d87bdc791efdf6621df9a69552dc12a84
-
SHA256
416293a2a049e175d85d418790035732eda8a055071d82d10f36a5bf6d9f246f
-
SHA512
1beb3ac230a17cf5a383660447368744d8ce183edbf5eba27d6b466031cdde96025ea32ad14d8ae6be3f0535a6537e41d3b4ff09fadd6f27aca14e8b94f79bbf
-
SSDEEP
24576:NFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFo:
Static task
static1
Behavioral task
behavioral1
Sample
File.js
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
File.js
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
File.js
-
Size
1024KB
-
MD5
e6ec998371e8e87c4fd54fab0753efd6
-
SHA1
78ffb07d87bdc791efdf6621df9a69552dc12a84
-
SHA256
416293a2a049e175d85d418790035732eda8a055071d82d10f36a5bf6d9f246f
-
SHA512
1beb3ac230a17cf5a383660447368744d8ce183edbf5eba27d6b466031cdde96025ea32ad14d8ae6be3f0535a6537e41d3b4ff09fadd6f27aca14e8b94f79bbf
-
SSDEEP
24576:NFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFo:
Score10/10-
Snake Keylogger payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-