General
-
Target
file.exe
-
Size
867KB
-
Sample
230306-s3l4nada95
-
MD5
e95d885c6ece5419fd104c8226aa7244
-
SHA1
8346e1c7c845b1b67437b8cf9ec103acfa9b2047
-
SHA256
f7626ca5799f9bb0842eb33d0c870ab943abed8eb6882dd11b4e741fa6453f25
-
SHA512
6fe7e8414834723f99c76d3ccafc2460f8111e71e8409cd0ff685b0ccf446304867d0ef775670f42cff2ea0d9cba52589eee6e2007279ab24916b4fce65e7a90
-
SSDEEP
24576:n1Qwe3cOQ/lMZbrpX6Bngbrxx/iaIU8Ucn:nBFAbVmgbrih
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5875198898:AAHb7cYwGrkdJdBq0_UiL6kYLg7WcXhadcM/sendMessage?chat_id=5279616630
Targets
-
-
Target
file.exe
-
Size
867KB
-
MD5
e95d885c6ece5419fd104c8226aa7244
-
SHA1
8346e1c7c845b1b67437b8cf9ec103acfa9b2047
-
SHA256
f7626ca5799f9bb0842eb33d0c870ab943abed8eb6882dd11b4e741fa6453f25
-
SHA512
6fe7e8414834723f99c76d3ccafc2460f8111e71e8409cd0ff685b0ccf446304867d0ef775670f42cff2ea0d9cba52589eee6e2007279ab24916b4fce65e7a90
-
SSDEEP
24576:n1Qwe3cOQ/lMZbrpX6Bngbrxx/iaIU8Ucn:nBFAbVmgbrih
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-