General
-
Target
be55cb1e227d740270f3b707b0fda3de22b3c547f57c2922ea11a5447112ad36
-
Size
1.2MB
-
Sample
230308-p3kztada48
-
MD5
e432e42f9ad32ec6b6ac0baea2c2513a
-
SHA1
74fa23d98d8772689a86ea3bf642cf09e82ef431
-
SHA256
be55cb1e227d740270f3b707b0fda3de22b3c547f57c2922ea11a5447112ad36
-
SHA512
9b461f9097aa5fccfa1510d4a4f8993df3db456e0ed1174ab191227f56f3015584789e7e7485edd65094678f49de94e79ff00c4520defa814f8429a443b52aee
-
SSDEEP
12288:9RT9qS1y9ezkbU5gqiqmbICf+N9251GJAMgi6H+8Y7M/zIwy6LBlBrbo+rk3Mvam:9RTd1y9ZlE0G1QLFJXyUiDx
Static task
static1
Behavioral task
behavioral1
Sample
be55cb1e227d740270f3b707b0fda3de22b3c547f57c2922ea11a5447112ad36.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
be55cb1e227d740270f3b707b0fda3de22b3c547f57c2922ea11a5447112ad36.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot6010601014:AAE_RJm-2igP99_YnmRQZ_TajH6dCuBx6CI/sendMessage?chat_id=869301167
Targets
-
-
Target
be55cb1e227d740270f3b707b0fda3de22b3c547f57c2922ea11a5447112ad36
-
Size
1.2MB
-
MD5
e432e42f9ad32ec6b6ac0baea2c2513a
-
SHA1
74fa23d98d8772689a86ea3bf642cf09e82ef431
-
SHA256
be55cb1e227d740270f3b707b0fda3de22b3c547f57c2922ea11a5447112ad36
-
SHA512
9b461f9097aa5fccfa1510d4a4f8993df3db456e0ed1174ab191227f56f3015584789e7e7485edd65094678f49de94e79ff00c4520defa814f8429a443b52aee
-
SSDEEP
12288:9RT9qS1y9ezkbU5gqiqmbICf+N9251GJAMgi6H+8Y7M/zIwy6LBlBrbo+rk3Mvam:9RTd1y9ZlE0G1QLFJXyUiDx
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-