General
-
Target
0d0ecf6e8227884c8e139316d81fe46e.bin
-
Size
856KB
-
Sample
230301-bc1exsdh74
-
MD5
76943d38601c967c4d600119fec20487
-
SHA1
0e52519631107b31fb1f4e62e9abe17fa93f9427
-
SHA256
6f04bd0f289ebf2274cb59e35dfdaf391ced46a082e0e89d52f336b835b1bdbd
-
SHA512
6f31184399f6ba880f65e4486f6a21fd52b533b227b466f50b70686f2d99a9bd9590ec793572767d2b17060bf24e90ea1df9131479e801e71597c835720e8b52
-
SSDEEP
12288:/tFqdAaHSRtSTYGPekd9jwE9k+P5tSO8XBYbO6rl+zxetCdunDPjh:/tFqJyWPekZwEa+P5tKGbOiEetUuB
Static task
static1
Behavioral task
behavioral1
Sample
854F1E97-5DBB-4A87-A566-33D9012B05E2.pdf.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
854F1E97-5DBB-4A87-A566-33D9012B05E2.pdf.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5253212199:AAG-02qWN77aEjxlYTZ-WAZ7WOi_I4kCde8/sendMessage?chat_id=2128925974
Targets
-
-
Target
854F1E97-5DBB-4A87-A566-33D9012B05E2.pdf.exe
-
Size
1.0MB
-
MD5
792f5da3b111eeea5a28da52d0d40538
-
SHA1
4c0ab6143d1eb5dc80b64f4f38b0dc6dce6b2152
-
SHA256
0bcf67c52f7b210cc7a7bb304e66d221f49363e7e9e75d21f7eeab8355669e2f
-
SHA512
f10cb56f555a9ba47ed67cf8da06278da98f48f47798776b7107f6324281fa2e304000a2d1963875c64082351ebf4c60909dcb09f15d9d8e05fa51c09596e8a1
-
SSDEEP
24576:uwk1hdKvPA+FfKZcC39pcs3tiveXRAxz/j:Zk34w+FfKqC3MCIvmRKz/j
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-