General
-
Target
tmp
-
Size
901KB
-
Sample
230323-l5vp9agh4t
-
MD5
8301d3d1a602b5aa7e72a57fb20d1a57
-
SHA1
0196e13d7e1ff5d71c994a70bc4585af52d890a0
-
SHA256
ad58ce24f9e160b6ace93452b01909c30d77643dfd8445ef27d8862442455b03
-
SHA512
2f99e3532af335c719100c12c0b67dc4ea507790c8fa17c8eea3a0dd10e6423f4be7a2eaddac2aa104f7ff62312036423b65d7ac5ffa57a6a870be6c2108e83a
-
SSDEEP
12288:OQCP4MZ1sTrbQWyQtI1op/5yKeCxXCZJjc2ydiMq3xoVbEAvxiLATAGn3WtNmBNG:OQCgMXs/bHy7U/MDCFSo2bMaxoVbr
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot6011587164:AAE511fkFXh2HFxNMsjh7DJ7AykzyWIVuaY/sendMessage?chat_id=6197263581
Targets
-
-
Target
tmp
-
Size
901KB
-
MD5
8301d3d1a602b5aa7e72a57fb20d1a57
-
SHA1
0196e13d7e1ff5d71c994a70bc4585af52d890a0
-
SHA256
ad58ce24f9e160b6ace93452b01909c30d77643dfd8445ef27d8862442455b03
-
SHA512
2f99e3532af335c719100c12c0b67dc4ea507790c8fa17c8eea3a0dd10e6423f4be7a2eaddac2aa104f7ff62312036423b65d7ac5ffa57a6a870be6c2108e83a
-
SSDEEP
12288:OQCP4MZ1sTrbQWyQtI1op/5yKeCxXCZJjc2ydiMq3xoVbEAvxiLATAGn3WtNmBNG:OQCgMXs/bHy7U/MDCFSo2bMaxoVbr
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-