General
-
Target
Advance Payment-50k.exe
-
Size
531KB
-
Sample
230216-mnfensgg8z
-
MD5
9730ee14db1d3088b284b3ad350fdb1b
-
SHA1
c1788dfd2f4faea8dc64652149b7190b714a9450
-
SHA256
107b4465806250a6fd7fda62b3ec399b4eaa97a7262bd4a9e13fbe96007ed99e
-
SHA512
dd4f721acaac67bad22750a3f55c14ee172e37e7cc324413745b7a898bbabb3dd4872864d0d0f2da4c13104c6e6cf15255343588eae8895d81659da797f07608
-
SSDEEP
12288:SYnY72NMiNoWNeq8VSx8kyGgu/pYqa3wzmJzZFfi2d:SYnYiN5NrNeY+HGgfdJzZdi2d
Static task
static1
Behavioral task
behavioral1
Sample
Advance Payment-50k.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Advance Payment-50k.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot6160036640:AAHqrAdmG4_GQkcLvxoups3k8WSEUC34w1g/sendMessage?chat_id=2052461776
Targets
-
-
Target
Advance Payment-50k.exe
-
Size
531KB
-
MD5
9730ee14db1d3088b284b3ad350fdb1b
-
SHA1
c1788dfd2f4faea8dc64652149b7190b714a9450
-
SHA256
107b4465806250a6fd7fda62b3ec399b4eaa97a7262bd4a9e13fbe96007ed99e
-
SHA512
dd4f721acaac67bad22750a3f55c14ee172e37e7cc324413745b7a898bbabb3dd4872864d0d0f2da4c13104c6e6cf15255343588eae8895d81659da797f07608
-
SSDEEP
12288:SYnY72NMiNoWNeq8VSx8kyGgu/pYqa3wzmJzZFfi2d:SYnYiN5NrNeY+HGgfdJzZdi2d
Score10/10-
Snake Keylogger payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-