General
-
Target
PO HGD-062-26.exe
-
Size
562KB
-
Sample
230502-ldevqaad54
-
MD5
d5a17638cd85bd565801945b2c1104fc
-
SHA1
edfdad7f4a70a535377d17987db7b4519bea6053
-
SHA256
70b86ae1a2b54a630bf94ed868958fdc478fa15368b29a8fef0953518fc64dad
-
SHA512
875e3ba9f7cf6c00d4f695e93263da0be4ceaee4d689f3c83baaa9ef227058eaff6e46443438b022b212cbf696622362e5933ca0df32bcf25d0f5440eb401832
-
SSDEEP
12288:czmI7l+NMu6AzfSjzOgiEtqzlQDZ3+gp/g0UZHu5fmL:CmN6QfmzM2yQDZ3+gVgO5fmL
Static task
static1
Behavioral task
behavioral1
Sample
PO HGD-062-26.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
PO HGD-062-26.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot6221660400:AAGb-WADrhdDFxd9kxzjtg3jdDw9-uvNVlM/sendMessage?chat_id=6200392710
Targets
-
-
Target
PO HGD-062-26.exe
-
Size
562KB
-
MD5
d5a17638cd85bd565801945b2c1104fc
-
SHA1
edfdad7f4a70a535377d17987db7b4519bea6053
-
SHA256
70b86ae1a2b54a630bf94ed868958fdc478fa15368b29a8fef0953518fc64dad
-
SHA512
875e3ba9f7cf6c00d4f695e93263da0be4ceaee4d689f3c83baaa9ef227058eaff6e46443438b022b212cbf696622362e5933ca0df32bcf25d0f5440eb401832
-
SSDEEP
12288:czmI7l+NMu6AzfSjzOgiEtqzlQDZ3+gp/g0UZHu5fmL:CmN6QfmzM2yQDZ3+gVgO5fmL
-
Snake Keylogger payload
-
StormKitty payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-