General
-
Target
2dd2ecb8470da41499622db0c5ecc953.exe
-
Size
1.1MB
-
Sample
230323-gwjjeafh5z
-
MD5
2dd2ecb8470da41499622db0c5ecc953
-
SHA1
6d95773939219455665e6f9b49f4d0628f29791a
-
SHA256
22b3c8355218fd0218d45ac51ac53e1322b54674e19bb8d428d8937e246dbb2a
-
SHA512
155d6cb24038f33d8a5590132478fa4ae73334ed39a1bac9e15a5cf7bb85b8887ed74a97070d174d23adf367db86063aa1487324ff2811978d088d819bdb5c85
-
SSDEEP
24576:tqGnNNycpUAELKV5UkvvWWJFVUkXO/8BOcpEujGRDyoM1iNT8Hs:UcpFE6WWJgkBMDyoWiQs
Static task
static1
Behavioral task
behavioral1
Sample
2dd2ecb8470da41499622db0c5ecc953.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2dd2ecb8470da41499622db0c5ecc953.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5850516910:AAGFrVyywXI7npTHbZn_GIq2nguuXg2t7Lc/sendMessage?chat_id=5716598986
Targets
-
-
Target
2dd2ecb8470da41499622db0c5ecc953.exe
-
Size
1.1MB
-
MD5
2dd2ecb8470da41499622db0c5ecc953
-
SHA1
6d95773939219455665e6f9b49f4d0628f29791a
-
SHA256
22b3c8355218fd0218d45ac51ac53e1322b54674e19bb8d428d8937e246dbb2a
-
SHA512
155d6cb24038f33d8a5590132478fa4ae73334ed39a1bac9e15a5cf7bb85b8887ed74a97070d174d23adf367db86063aa1487324ff2811978d088d819bdb5c85
-
SSDEEP
24576:tqGnNNycpUAELKV5UkvvWWJFVUkXO/8BOcpEujGRDyoM1iNT8Hs:UcpFE6WWJgkBMDyoWiQs
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-