General
-
Target
BRUwtN9nZSBhYk3.exe
-
Size
725KB
-
Sample
230505-nfzzsabf6w
-
MD5
55762c06fdd519ca1d9a090adad5cc0f
-
SHA1
4bd9464fb9cbc638c4aae5424c6b7b25120d283a
-
SHA256
fac3d893e2a1e4bb7bca111e12f5bc52f8fbde33d8dc16163ebc79253b19829a
-
SHA512
4579511f855b017056b4b7dd230dc9d30a229d5c217e78bb6c91cfa23a07d1eb821a7e3fce13c54b45883e6238a40e9cc238eca8edc9f9319da63bb823a325ab
-
SSDEEP
12288:9bkcdXHwni4IyS+6a/cSGDxX1TtpWoYibHiQr81BOGzP/ox6fxMrnQqD53sOY:9bJNwL6ecLDxlqKc5noxtrnQsBsP
Static task
static1
Behavioral task
behavioral1
Sample
BRUwtN9nZSBhYk3.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
BRUwtN9nZSBhYk3.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5801425382:AAG5b4PUEaqNDv5uP9ejZGeIHeuzzOD4IHY/sendMessage?chat_id=5812329204
Targets
-
-
Target
BRUwtN9nZSBhYk3.exe
-
Size
725KB
-
MD5
55762c06fdd519ca1d9a090adad5cc0f
-
SHA1
4bd9464fb9cbc638c4aae5424c6b7b25120d283a
-
SHA256
fac3d893e2a1e4bb7bca111e12f5bc52f8fbde33d8dc16163ebc79253b19829a
-
SHA512
4579511f855b017056b4b7dd230dc9d30a229d5c217e78bb6c91cfa23a07d1eb821a7e3fce13c54b45883e6238a40e9cc238eca8edc9f9319da63bb823a325ab
-
SSDEEP
12288:9bkcdXHwni4IyS+6a/cSGDxX1TtpWoYibHiQr81BOGzP/ox6fxMrnQqD53sOY:9bJNwL6ecLDxlqKc5noxtrnQsBsP
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-