General
-
Target
Swift Copy.exe
-
Size
964KB
-
Sample
230329-qhsplagd75
-
MD5
d31a8b42cf154d96a2b46c31ef0bb430
-
SHA1
85ceb725906c46e80ce01d502b9e3229f390ca9e
-
SHA256
d2a9785bb59a18b2615a8bc600698418ffec3af79192b74cf2f0c1dd9efcadb6
-
SHA512
1dba405b111f1350baa6e6ac39b2ffc077999092547607f8ef3b3b4e3d495bec28a4ca980a7024c9fc40076aa9e33446f26636182bd03c0bc3077fe82a0741f0
-
SSDEEP
24576:p412zVZ97TlYyD3LtBuPD87DcEgA3Vr/X3:p4AR37pYyDBMgdgA3V7
Static task
static1
Behavioral task
behavioral1
Sample
Swift Copy.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Swift Copy.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot6284958682:AAFqhG3qHKFjAq48ezySmL8vRDzlw2Jx9s8/sendMessage?chat_id=5636036075
Targets
-
-
Target
Swift Copy.exe
-
Size
964KB
-
MD5
d31a8b42cf154d96a2b46c31ef0bb430
-
SHA1
85ceb725906c46e80ce01d502b9e3229f390ca9e
-
SHA256
d2a9785bb59a18b2615a8bc600698418ffec3af79192b74cf2f0c1dd9efcadb6
-
SHA512
1dba405b111f1350baa6e6ac39b2ffc077999092547607f8ef3b3b4e3d495bec28a4ca980a7024c9fc40076aa9e33446f26636182bd03c0bc3077fe82a0741f0
-
SSDEEP
24576:p412zVZ97TlYyD3LtBuPD87DcEgA3Vr/X3:p4AR37pYyDBMgdgA3V7
Score10/10-
Snake Keylogger payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-