General
-
Target
2187a019e706bbd61c23e8bb6e8c52d7.bin
-
Size
276KB
-
Sample
230302-bd6ckaah58
-
MD5
58f3c00225a143d064c8e11ff6e04dfc
-
SHA1
974aae63b4f816b692789912c9569134ef760345
-
SHA256
764f315bc712165766db3ca0246504b88ea0d7d19186be356e14ce13372542e4
-
SHA512
d5ea3569a8a8a1cb48c03c1b07b82ee5416c2c0a628af31df9dc75e728b53b5a5adc201415961af5542f263d7026100c3efb4d4df2e8920b455ca840ce5c752d
-
SSDEEP
6144:OxAgmC5ycPuipd6M/bDxBuOTU+XL0vdGWinBGhmrTxJCDyi6a8:KQcPuO6MPuOvgvde3TxJkyi6f
Static task
static1
Behavioral task
behavioral1
Sample
4ab558181de9bd2dd00dc75eb66840c18c9243c62d72ee90d4e037d9be472721.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
4ab558181de9bd2dd00dc75eb66840c18c9243c62d72ee90d4e037d9be472721.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5972904963:AAH_L0Z1BaWpBDyPhmUAMb5yVXWF00k11jk/sendMessage?chat_id=5334267822
Targets
-
-
Target
4ab558181de9bd2dd00dc75eb66840c18c9243c62d72ee90d4e037d9be472721.exe
-
Size
291KB
-
MD5
2187a019e706bbd61c23e8bb6e8c52d7
-
SHA1
c6de153270978951a9583b5cf53f76f14a1d6392
-
SHA256
4ab558181de9bd2dd00dc75eb66840c18c9243c62d72ee90d4e037d9be472721
-
SHA512
f7035b25e8f028785042636a9824d74c5fdd82075cfa537ff36effbba6a850d3206d13c93923f6b5225aa44655685e4d1e1ca4f6da18132130860a9ffae6e2b3
-
SSDEEP
6144:9Ya6bgG4b0kMEMSz1RMxASpy6xLfkMGC1rEwZzFCuwyIJSm:9YF1AHHzXMPpy2LfUC1JpFkD
Score10/10-
Snake Keylogger payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-