General
-
Target
Outstanding Invoices.exe
-
Size
922KB
-
Sample
230211-knrftsba5x
-
MD5
63e79c03e27bdb4e1c8c3e86bf738a6e
-
SHA1
9135c7c7ba8b9d916715ad1154ee98b96faa7ee4
-
SHA256
d3b0b5bca293b8e381c6c96e90d0fc92f3a9bc03d51040b7f4596fb54df8b7df
-
SHA512
cc8b27adf2e806a9b7f10382015a3c3349518be68a5bbdc2fbf4e61a8122e02ebfedc75f131509e6bdb9c528388e646891e52e404e3f9db8d0362fb60ff46d0e
-
SSDEEP
24576:igueDiKQPSDIl+nevSCiYDCPGBUbpM3LG7eSLDx:5ueuTxiiBUbpM7r0
Static task
static1
Behavioral task
behavioral1
Sample
Outstanding Invoices.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Outstanding Invoices.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5816458649:AAFS1obzDKYH_QeQC_kvYxhd80vhKb3q6Vs/sendMessage?chat_id=5586449047
Targets
-
-
Target
Outstanding Invoices.exe
-
Size
922KB
-
MD5
63e79c03e27bdb4e1c8c3e86bf738a6e
-
SHA1
9135c7c7ba8b9d916715ad1154ee98b96faa7ee4
-
SHA256
d3b0b5bca293b8e381c6c96e90d0fc92f3a9bc03d51040b7f4596fb54df8b7df
-
SHA512
cc8b27adf2e806a9b7f10382015a3c3349518be68a5bbdc2fbf4e61a8122e02ebfedc75f131509e6bdb9c528388e646891e52e404e3f9db8d0362fb60ff46d0e
-
SSDEEP
24576:igueDiKQPSDIl+nevSCiYDCPGBUbpM3LG7eSLDx:5ueuTxiiBUbpM7r0
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-