General
-
Target
doc-file001.exe
-
Size
443KB
-
Sample
230505-ngklgshg35
-
MD5
89eb31c562df76938824479d9d5dba79
-
SHA1
d33bbfeaeee240750c26a5f56aaa26d70ffec8ac
-
SHA256
5e8cf27b727d949ee81c63189ff3a7f4137ecddff9a449e0889d78c16e55d13c
-
SHA512
301d281ba18f00516697552731b74fa16c69f283dff6c61c298523a59d9744852d7a327815315468159a206528d675202d635576a2f6654ab9638dd479cfc9bd
-
SSDEEP
12288:ITmgp57gEMX668YM2KGgQeq31apMciv6nnjqKoe:IfK6q/v6nnjqKoe
Static task
static1
Behavioral task
behavioral1
Sample
doc-file001.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
doc-file001.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot6296181609:AAGAOhYH-dkTEQqHw-rWHbkpGOeR4Z7OA18/sendMessage?chat_id=1760125104
Targets
-
-
Target
doc-file001.exe
-
Size
443KB
-
MD5
89eb31c562df76938824479d9d5dba79
-
SHA1
d33bbfeaeee240750c26a5f56aaa26d70ffec8ac
-
SHA256
5e8cf27b727d949ee81c63189ff3a7f4137ecddff9a449e0889d78c16e55d13c
-
SHA512
301d281ba18f00516697552731b74fa16c69f283dff6c61c298523a59d9744852d7a327815315468159a206528d675202d635576a2f6654ab9638dd479cfc9bd
-
SSDEEP
12288:ITmgp57gEMX668YM2KGgQeq31apMciv6nnjqKoe:IfK6q/v6nnjqKoe
-
Snake Keylogger payload
-
StormKitty payload
-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-