General
-
Target
b87ccb38d408270f66f79e7d0e9734b9.exe
-
Size
126KB
-
Sample
230505-xwd7paae5v
-
MD5
b87ccb38d408270f66f79e7d0e9734b9
-
SHA1
eb3f89cc8572d102931e2a4be4400178cf4ef8d3
-
SHA256
7ad28fb37f9da0fde0ffb177a30906f48388e89e61ea5e8decb7e94e06661504
-
SHA512
cf0fa28a217a1cda9d9ca9f06d73357f471b48f34d87f38c0df762e2f326f74eeadb263fdde4635c7af746fc6033c31a9fb122cdb1c55eaa1b5f9e41e6fc74af
-
SSDEEP
1536:4tMpEvqHEIsang0ly+G0/nE+vBUFrlY9DZKkAMFFORnT/G22C7kbKuzPjaQlBUpx:4tMKHE/tDZvORT/G4Qbfrm4B+wBjFbY
Behavioral task
behavioral1
Sample
b87ccb38d408270f66f79e7d0e9734b9.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
b87ccb38d408270f66f79e7d0e9734b9.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot6029559841:AAEqr8_NCfqapJgAzw8PoPbqoCosnsk1VO0/sendMessage?chat_id=6033043077
Targets
-
-
Target
b87ccb38d408270f66f79e7d0e9734b9.exe
-
Size
126KB
-
MD5
b87ccb38d408270f66f79e7d0e9734b9
-
SHA1
eb3f89cc8572d102931e2a4be4400178cf4ef8d3
-
SHA256
7ad28fb37f9da0fde0ffb177a30906f48388e89e61ea5e8decb7e94e06661504
-
SHA512
cf0fa28a217a1cda9d9ca9f06d73357f471b48f34d87f38c0df762e2f326f74eeadb263fdde4635c7af746fc6033c31a9fb122cdb1c55eaa1b5f9e41e6fc74af
-
SSDEEP
1536:4tMpEvqHEIsang0ly+G0/nE+vBUFrlY9DZKkAMFFORnT/G22C7kbKuzPjaQlBUpx:4tMKHE/tDZvORT/G4Qbfrm4B+wBjFbY
-
Snake Keylogger payload
-
StormKitty payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-