General
-
Target
INV 002000-2023.exe
-
Size
1.1MB
-
Sample
230208-w4xhkadd6x
-
MD5
e6a3824b28ef184b23ccca2f28dca151
-
SHA1
b6bd15342f2842f7a27b96fced186c3fbe003daf
-
SHA256
9eb40372237691f70f98fd3b46e040131d0e1144e62a79ce3709f4ed786907e0
-
SHA512
26d6d5d5adfab6a89a9dba91cafabadfbe210fd635606a3b451eab089355335b85f027b148f092382f249c85cd3b8c16be31310957b078aaccd0bc55423dabe2
-
SSDEEP
12288:1DdNuif+9gLHHPrpg6+R4cSbEX7ULxMtwprXauFRovStpBmfYx58QVC6gnu5242H:HNuiWGLHHPrpg6+R4K9gpgwoTnjBT
Static task
static1
Behavioral task
behavioral1
Sample
INV 002000-2023.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
INV 002000-2023.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5434559816:AAEK4UyY4a6PcJctHP2Ip_JJDu3VHM5TgBU/sendMessage?chat_id=935548406
Targets
-
-
Target
INV 002000-2023.exe
-
Size
1.1MB
-
MD5
e6a3824b28ef184b23ccca2f28dca151
-
SHA1
b6bd15342f2842f7a27b96fced186c3fbe003daf
-
SHA256
9eb40372237691f70f98fd3b46e040131d0e1144e62a79ce3709f4ed786907e0
-
SHA512
26d6d5d5adfab6a89a9dba91cafabadfbe210fd635606a3b451eab089355335b85f027b148f092382f249c85cd3b8c16be31310957b078aaccd0bc55423dabe2
-
SSDEEP
12288:1DdNuif+9gLHHPrpg6+R4cSbEX7ULxMtwprXauFRovStpBmfYx58QVC6gnu5242H:HNuiWGLHHPrpg6+R4K9gpgwoTnjBT
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-