General
-
Target
zwqzBp3lyu3UPYc.exe
-
Size
662KB
-
Sample
230505-zw448aef53
-
MD5
665e0b39d01ec408f1e8f7fc1b2bec32
-
SHA1
a42c424b54ac462f3158eff4b873bb0b0535d58f
-
SHA256
15696d741a180dacb5b3bb87cad566b4f2ffca1df0a6673d03f9b40c71ea4def
-
SHA512
bc225e25ab3f5c1621b3ce91372c811444e20777ada905079fb560c991fccee3a14f7887ac623c6bf89e0b88323588457a1aab1f1cd3662214bc686b05e7508e
-
SSDEEP
12288:e7ni4IykaC+tMsWsNjQ9s+7LyW3avZPox1SumL:e7cd+tEqcLLyLhS1Sum
Static task
static1
Behavioral task
behavioral1
Sample
zwqzBp3lyu3UPYc.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
zwqzBp3lyu3UPYc.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5850516910:AAGFrVyywXI7npTHbZn_GIq2nguuXg2t7Lc/sendMessage?chat_id=5716598986
Targets
-
-
Target
zwqzBp3lyu3UPYc.exe
-
Size
662KB
-
MD5
665e0b39d01ec408f1e8f7fc1b2bec32
-
SHA1
a42c424b54ac462f3158eff4b873bb0b0535d58f
-
SHA256
15696d741a180dacb5b3bb87cad566b4f2ffca1df0a6673d03f9b40c71ea4def
-
SHA512
bc225e25ab3f5c1621b3ce91372c811444e20777ada905079fb560c991fccee3a14f7887ac623c6bf89e0b88323588457a1aab1f1cd3662214bc686b05e7508e
-
SSDEEP
12288:e7ni4IykaC+tMsWsNjQ9s+7LyW3avZPox1SumL:e7cd+tEqcLLyLhS1Sum
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-