General
-
Target
Belge.exe
-
Size
905KB
-
Sample
230330-ltx18sde7z
-
MD5
2568de65fcdccbc160da2452452cbe09
-
SHA1
38e434176706827e20a786de0bd656218005c9fb
-
SHA256
559b97a856fca272b7f5891100f1317d5f4846d12e86d113c8334c9861e4b026
-
SHA512
d0e05fda14e4b5ebb00dee9a0e965b7720b866393f022a452c29a10f75ad76c7e79bd4d16bc11319c658965c7843f3b15a33930c174a82ace144f105ac2496b3
-
SSDEEP
12288:xk5+ytZpYWHE4SODt+cIpPrzh8x55thIimOMt+6I:xy+yyWk495+cIpPrzhethIimX3I
Static task
static1
Behavioral task
behavioral1
Sample
Belge.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Belge.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5587666659:AAG8NrrXJQs__dhk8nLJBFOspz2my8OVpX0/sendMessage?chat_id=5569775004
Targets
-
-
Target
Belge.exe
-
Size
905KB
-
MD5
2568de65fcdccbc160da2452452cbe09
-
SHA1
38e434176706827e20a786de0bd656218005c9fb
-
SHA256
559b97a856fca272b7f5891100f1317d5f4846d12e86d113c8334c9861e4b026
-
SHA512
d0e05fda14e4b5ebb00dee9a0e965b7720b866393f022a452c29a10f75ad76c7e79bd4d16bc11319c658965c7843f3b15a33930c174a82ace144f105ac2496b3
-
SSDEEP
12288:xk5+ytZpYWHE4SODt+cIpPrzh8x55thIimOMt+6I:xy+yyWk495+cIpPrzhethIimX3I
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-