General
-
Target
26ccb92135211217dce32c7b5dfd3af5.exe
-
Size
205KB
-
Sample
230211-kpwryaca86
-
MD5
26ccb92135211217dce32c7b5dfd3af5
-
SHA1
7f4b0b0ba631d57ce442a3f5470bda1920b621af
-
SHA256
c256fc962fd5d733431d3132bbf60ee1b02d205825704e7bf660c3b39ceb1aa3
-
SHA512
71c4b70671efebac280ffa0ae160ce86baa46b303187afff23c807c8c7c80aa6b1fb76d30abbbfdd1745f395e5711c6a419fcd9c0b61c4f344eea7087a1fa4dd
-
SSDEEP
3072:GqqaM97eOTPiK3DruiiF/XbKjPk18lVAgAEzoHj/LDd280fqMlb8S2wBj2WFbYQ:VCteODDmzKR+aWVMlb72SbP
Behavioral task
behavioral1
Sample
26ccb92135211217dce32c7b5dfd3af5.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
26ccb92135211217dce32c7b5dfd3af5.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5843567515:AAEdtJWwcJKNn64U81CKVdG-li_Ejds8raM/sendMessage?chat_id=1639214896
Targets
-
-
Target
26ccb92135211217dce32c7b5dfd3af5.exe
-
Size
205KB
-
MD5
26ccb92135211217dce32c7b5dfd3af5
-
SHA1
7f4b0b0ba631d57ce442a3f5470bda1920b621af
-
SHA256
c256fc962fd5d733431d3132bbf60ee1b02d205825704e7bf660c3b39ceb1aa3
-
SHA512
71c4b70671efebac280ffa0ae160ce86baa46b303187afff23c807c8c7c80aa6b1fb76d30abbbfdd1745f395e5711c6a419fcd9c0b61c4f344eea7087a1fa4dd
-
SSDEEP
3072:GqqaM97eOTPiK3DruiiF/XbKjPk18lVAgAEzoHj/LDd280fqMlb8S2wBj2WFbYQ:VCteODDmzKR+aWVMlb72SbP
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-