General
-
Target
PO YDTGHRTCG.exe
-
Size
587KB
-
Sample
230421-szkfnagd53
-
MD5
056bbe48688212700c08b0cef11e41be
-
SHA1
ef7864d95657c2f4566dace5cf382ce3a3829699
-
SHA256
fa0347649fd59361aabea1d68c50b40bfca3835543cbf43620ee8e44f7214d5e
-
SHA512
602566df8dac33ed4062162ff62ed130703168eb2cac34e26d4f71288ae74bdede465854bf6573c15174c5a0ea9931d639f16feb0f5815a58b3c2c9d771502b3
-
SSDEEP
6144:MiknabTyYwDAEWEtc7aeT+7tN3Fu/OxAPZl7it9Xf8vC0uJlLsZRFJKv0ND:SnuuYwUEWqXeaZ1FBxAPLWrbJAFK0
Static task
static1
Behavioral task
behavioral1
Sample
PO YDTGHRTCG.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
PO YDTGHRTCG.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5818680343:AAGVJsfIHcopySiifMCdAaFCv-ICp2_Yo_M/sendMessage?chat_id=5765702254
Targets
-
-
Target
PO YDTGHRTCG.exe
-
Size
587KB
-
MD5
056bbe48688212700c08b0cef11e41be
-
SHA1
ef7864d95657c2f4566dace5cf382ce3a3829699
-
SHA256
fa0347649fd59361aabea1d68c50b40bfca3835543cbf43620ee8e44f7214d5e
-
SHA512
602566df8dac33ed4062162ff62ed130703168eb2cac34e26d4f71288ae74bdede465854bf6573c15174c5a0ea9931d639f16feb0f5815a58b3c2c9d771502b3
-
SSDEEP
6144:MiknabTyYwDAEWEtc7aeT+7tN3Fu/OxAPZl7it9Xf8vC0uJlLsZRFJKv0ND:SnuuYwUEWqXeaZ1FBxAPLWrbJAFK0
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-