General
-
Target
23147a614a485e4d60fb32e57bcb62e2229ecb0fcc7e8c754e0bbec3f880dfe5
-
Size
204KB
-
Sample
230103-f1ewcahh72
-
MD5
061d9c583309a760001a38a422328eca
-
SHA1
035dedefadeee72fe432ee0d26aa0f3d6ca3ae8a
-
SHA256
23147a614a485e4d60fb32e57bcb62e2229ecb0fcc7e8c754e0bbec3f880dfe5
-
SHA512
901cb3becc180c84baa50e948cef1a8df6522329d18942627c3bf8de49d25dbc9c4d9edc0d30e329eb0bce23cf2cdb33840a1fab486149e1ad16937aab856cea
-
SSDEEP
3072:kqqaM97eOTPiK3DruiiwT/XbKjPM1817FlAi/s+PkZu0eLTkZ4nb87X9wBlJFbYb:PCteODD/TzKZxvp5nbkXQ3bs
Behavioral task
behavioral1
Sample
23147a614a485e4d60fb32e57bcb62e2229ecb0fcc7e8c754e0bbec3f880dfe5.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
23147a614a485e4d60fb32e57bcb62e2229ecb0fcc7e8c754e0bbec3f880dfe5.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5409930542:AAFxwqGbFuHLkEcoI_Wd5LmyaZ64bak9as0/sendMessage?chat_id=5492983899
Targets
-
-
Target
23147a614a485e4d60fb32e57bcb62e2229ecb0fcc7e8c754e0bbec3f880dfe5
-
Size
204KB
-
MD5
061d9c583309a760001a38a422328eca
-
SHA1
035dedefadeee72fe432ee0d26aa0f3d6ca3ae8a
-
SHA256
23147a614a485e4d60fb32e57bcb62e2229ecb0fcc7e8c754e0bbec3f880dfe5
-
SHA512
901cb3becc180c84baa50e948cef1a8df6522329d18942627c3bf8de49d25dbc9c4d9edc0d30e329eb0bce23cf2cdb33840a1fab486149e1ad16937aab856cea
-
SSDEEP
3072:kqqaM97eOTPiK3DruiiwT/XbKjPM1817FlAi/s+PkZu0eLTkZ4nb87X9wBlJFbYb:PCteODD/TzKZxvp5nbkXQ3bs
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-