General
-
Target
97653456890SK.exe
-
Size
2.8MB
-
Sample
230505-nhqh5ahg59
-
MD5
da29b25f1adc381d121c8ba9491ab8c7
-
SHA1
b53e7a602e92b695677ab8b6e4b1f41f3ebf521e
-
SHA256
9489bbf4b51b344c381683f04c60d7f6d73580af9b9e9b2b6dc395a0138f89f9
-
SHA512
ae398984afb4755136b7ca960d85c3b52ee81885646547387b64e7aaf978339afe0e7002fef5db3a74f10d711529ca4482ad45864c294de7a413e6a1377b6107
-
SSDEEP
49152:sH8IHOSXcA44fAYz1sahArGSnovaPMNagNeI:sH1/SzFMNN
Static task
static1
Behavioral task
behavioral1
Sample
97653456890SK.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
97653456890SK.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5801425382:AAG5b4PUEaqNDv5uP9ejZGeIHeuzzOD4IHY/sendMessage?chat_id=5812329204
Targets
-
-
Target
97653456890SK.exe
-
Size
2.8MB
-
MD5
da29b25f1adc381d121c8ba9491ab8c7
-
SHA1
b53e7a602e92b695677ab8b6e4b1f41f3ebf521e
-
SHA256
9489bbf4b51b344c381683f04c60d7f6d73580af9b9e9b2b6dc395a0138f89f9
-
SHA512
ae398984afb4755136b7ca960d85c3b52ee81885646547387b64e7aaf978339afe0e7002fef5db3a74f10d711529ca4482ad45864c294de7a413e6a1377b6107
-
SSDEEP
49152:sH8IHOSXcA44fAYz1sahArGSnovaPMNagNeI:sH1/SzFMNN
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-