General
-
Target
9f7e4c0f47ffa44b03cc568541e5b1c5e2a1a2cbf8d30585129f11a5253ca20d.zip
-
Size
677KB
-
Sample
230321-r41srsde5y
-
MD5
e11cea58cbc18045f1f94086b5fcd442
-
SHA1
08dd3052cc67ccd1b68c9236a236998cc98abd1b
-
SHA256
584fb6b46f6916da661e9f67768154428400af0134fa01d11142f2b4d5e6b303
-
SHA512
ae8f3f8cad8d2e4c8ff871df7ac0335df1c092c09aa840d6a88de61ccd5260cd38e1cc0966566b3302b88bcf3e9d6cfc758c3b90bafb89a10e84d4ecc7da2de7
-
SSDEEP
12288:3hJrE7Eu8cUxX+qixpRmz+JNEER/+izA8Cb3u3PlYTlVNZY4LYg058WTrxS/ezwW:3hFE7iPXIpRmq/EE3zAANYTlVHp2xS/A
Static task
static1
Behavioral task
behavioral1
Sample
9f7e4c0f47ffa44b03cc568541e5b1c5e2a1a2cbf8d30585129f11a5253ca20d.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
9f7e4c0f47ffa44b03cc568541e5b1c5e2a1a2cbf8d30585129f11a5253ca20d.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot6011587164:AAE511fkFXh2HFxNMsjh7DJ7AykzyWIVuaY/sendMessage?chat_id=6197263581
Targets
-
-
Target
9f7e4c0f47ffa44b03cc568541e5b1c5e2a1a2cbf8d30585129f11a5253ca20d.exe
-
Size
744KB
-
MD5
f99d5a071e38ed4add47c1d47f657422
-
SHA1
94dbd1b97186229391c002d8f4b7aa1f65b386d4
-
SHA256
9f7e4c0f47ffa44b03cc568541e5b1c5e2a1a2cbf8d30585129f11a5253ca20d
-
SHA512
3031c8ba5236d04571a4849656c2d5ed5c54c18e98100beb91738b45f02332d60560aa42132be84b29d3598536d6b5472e3aa019c533a2029bd81fbe1a80647b
-
SSDEEP
12288:gifU3XkzmeoZcEws6AVBYltazIYTX/5J3JFsjx+MNo91XIkrqQqtxPHEoqBChsMe:gOLzD6cEwHAValtazXb5FJCFjeyk1qtO
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-