General
-
Target
ödeme kopyası.exe
-
Size
645KB
-
Sample
230302-nkz6cacc8s
-
MD5
6b0cd310489275fdbe09581682790b99
-
SHA1
fae5ab4d62fbe0e06c493423ea82d70f928853eb
-
SHA256
d2f683f8573debf656f41e4a53913c747d3699975e5ee04c7cac8a9b41587bfb
-
SHA512
5a6ac842465dd918eeaab7d31d86aeaa0cdd6c2e87641f0e0b13a3d48ff523c26964ed0e61268f776008ac3495febc2343f3b645f42263bb5b61bd003572e72b
-
SSDEEP
12288:OYCPOJq0bLW6PEKEFMHhkhpLzDtv0BLtQL21goNORLMz:OYCPOVWAEKwMsBDtMWR+KMz
Static task
static1
Behavioral task
behavioral1
Sample
ödeme kopyası.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ödeme kopyası.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5843567515:AAEdtJWwcJKNn64U81CKVdG-li_Ejds8raM/sendMessage?chat_id=1639214896
Targets
-
-
Target
ödeme kopyası.exe
-
Size
645KB
-
MD5
6b0cd310489275fdbe09581682790b99
-
SHA1
fae5ab4d62fbe0e06c493423ea82d70f928853eb
-
SHA256
d2f683f8573debf656f41e4a53913c747d3699975e5ee04c7cac8a9b41587bfb
-
SHA512
5a6ac842465dd918eeaab7d31d86aeaa0cdd6c2e87641f0e0b13a3d48ff523c26964ed0e61268f776008ac3495febc2343f3b645f42263bb5b61bd003572e72b
-
SSDEEP
12288:OYCPOJq0bLW6PEKEFMHhkhpLzDtv0BLtQL21goNORLMz:OYCPOVWAEKwMsBDtMWR+KMz
Score10/10-
Snake Keylogger payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-