General
-
Target
VSL Q88.exe
-
Size
17KB
-
Sample
230125-mh8t2afg25
-
MD5
abb62deff1e4851be179ab55fb65e4a7
-
SHA1
36d60ff07bcfdbe6c83c69079c954cc655bd9557
-
SHA256
35a1eb3544b13e48380568cef531dec8473aa229fa4fccc532898b2c514f05ab
-
SHA512
2e80e80a3c8b3aa4a2a49a8bdc618f464f399e98da68dac4a558282dc237cdd7e4a899969695661af3d462d0c46e211bbd9ae1ee8a55658f724d852cd98b1e6b
-
SSDEEP
384:eBHyHMiAiIufjm2g6WeLLB3mDTQ8T3Jd:YHyHMi0ufj3H5F3mDF3T
Static task
static1
Behavioral task
behavioral1
Sample
VSL Q88.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
VSL Q88.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot1897716112:AAEAtOCkOV8umHBB93Og24bkiIdUKReGK44/sendMessage?chat_id=1745211648
Targets
-
-
Target
VSL Q88.exe
-
Size
17KB
-
MD5
abb62deff1e4851be179ab55fb65e4a7
-
SHA1
36d60ff07bcfdbe6c83c69079c954cc655bd9557
-
SHA256
35a1eb3544b13e48380568cef531dec8473aa229fa4fccc532898b2c514f05ab
-
SHA512
2e80e80a3c8b3aa4a2a49a8bdc618f464f399e98da68dac4a558282dc237cdd7e4a899969695661af3d462d0c46e211bbd9ae1ee8a55658f724d852cd98b1e6b
-
SSDEEP
384:eBHyHMiAiIufjm2g6WeLLB3mDTQ8T3Jd:YHyHMi0ufj3H5F3mDF3T
-
Snake Keylogger payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-