General
-
Target
e90d3ec392d44522f55a0cf054c211a9.exe
-
Size
754KB
-
Sample
230327-m7ebqadb82
-
MD5
e90d3ec392d44522f55a0cf054c211a9
-
SHA1
0c6247533089c0b7bb4a29a08a6434bfad26b0bf
-
SHA256
fbca5195cab9ea8df36b6123fd0e23f2e1ca97cd0b61d6d40ecee6611f31c8ff
-
SHA512
805c64d65a8a3f8c9663cd8714edc0ec87fa0fba43e0efd31dac78ff4b2de86ed6cda1fddf1b1da49ef17d6b5afd7d84e8d505828723d0a1d386bffad0d7f773
-
SSDEEP
12288:DA5YB0OlJhZ5tgLV/651iqUGqGATBAoWL1EoU1cWT6p7r+72KQoIX9ie7zQpSQo:DA5AVDb2/65IqUJA1vycWOqvVIXQeq
Static task
static1
Behavioral task
behavioral1
Sample
e90d3ec392d44522f55a0cf054c211a9.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e90d3ec392d44522f55a0cf054c211a9.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot6011587164:AAE511fkFXh2HFxNMsjh7DJ7AykzyWIVuaY/sendMessage?chat_id=6197263581
Targets
-
-
Target
e90d3ec392d44522f55a0cf054c211a9.exe
-
Size
754KB
-
MD5
e90d3ec392d44522f55a0cf054c211a9
-
SHA1
0c6247533089c0b7bb4a29a08a6434bfad26b0bf
-
SHA256
fbca5195cab9ea8df36b6123fd0e23f2e1ca97cd0b61d6d40ecee6611f31c8ff
-
SHA512
805c64d65a8a3f8c9663cd8714edc0ec87fa0fba43e0efd31dac78ff4b2de86ed6cda1fddf1b1da49ef17d6b5afd7d84e8d505828723d0a1d386bffad0d7f773
-
SSDEEP
12288:DA5YB0OlJhZ5tgLV/651iqUGqGATBAoWL1EoU1cWT6p7r+72KQoIX9ie7zQpSQo:DA5AVDb2/65IqUJA1vycWOqvVIXQeq
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-