General
-
Target
8293cd160f659e666c7b6eafdb0cc62c7c6afba2
-
Size
555KB
-
Sample
230131-b2h7yafh2z
-
MD5
2f407692d2f08c9de10c767088d3fec0
-
SHA1
8293cd160f659e666c7b6eafdb0cc62c7c6afba2
-
SHA256
547451ce0acd166a15499635eb30ffaf0871ae5eb24d580113cac84bc065636c
-
SHA512
7a67fcf9449d21d31dec4bfdab4b098b9cf1b8d4be54ec8c29f585bf9119bfbce93f4ed96bb891f041dce43dfec3d60cf879e43feca8290f0e5e8715b6b4f7ae
-
SSDEEP
12288:zXDa8eBKTqcWYi+Pmo0zpZMBk0LLG46d4j7r6mSfE/R:jDPeBKT2p++o01mDLG46uP2c/R
Static task
static1
Behavioral task
behavioral1
Sample
zV75lTXPGhSIuFY.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
zV75lTXPGhSIuFY.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
smtp.lgsportbike.com - Port:
587 - Username:
[email protected] - Password:
sAN%r!I0
https://api.telegram.org/bot5816458649:AAFS1obzDKYH_QeQC_kvYxhd80vhKb3q6Vs/sendMessage?chat_id=5586449047
Targets
-
-
Target
zV75lTXPGhSIuFY.exe
-
Size
681KB
-
MD5
5e3e17fdf1f4da26cf38aa79b3bdae04
-
SHA1
da24d1115793c155956f9c06c7bd54143fc49f5a
-
SHA256
62ca4586ac29248b3157be211125dc47a83a64cb23ceaab4bf50d0767baa6fbe
-
SHA512
7906bcf13e209cb38837cf9cd254455ff8f6e76a60c2d4d146a085d4e2bbbdb1e17ec876bb171be9d9bc4dd711c873d24381c30372c7dd16147a77e924e05432
-
SSDEEP
12288:TeDonSyWeh3ih9HXeipFQahcvGr7tv7g4IG3Gmv6aKJfsHA:TWonDBYTOiAaqU7nGMpwfJ
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-