General
-
Target
Ekstre.exe
-
Size
1.3MB
-
Sample
230510-m25lqahd6x
-
MD5
076d5430af1ffea960bd52cfc641e99b
-
SHA1
aba1bf8a90fabe96565ecec2022d24e34626a921
-
SHA256
ee0fac5b1ab0a1e4c8efadea7919f8f1105d0928ca3a7c359a65af0246e06cf1
-
SHA512
50966bf59360c3a6a52716e3bb63a5d91bad4bd208241431ed15107ba94f40b4a6790042e0839ec8d63a3c521242032ad374b7511b5aa194eff5b063226d38bd
-
SSDEEP
24576:lTbBv5rUFcD6vbKBdqT4oDKvMrBW4eNTygt90e+hoyaxlI:PBH6vbKBUT4/vMr8jygt+0I
Static task
static1
Behavioral task
behavioral1
Sample
Ekstre.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Ekstre.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5932548741:AAFytn5z9IUn93hcbUn3eb19fE08x1AWGz0/sendMessage?chat_id=5034680713
Targets
-
-
Target
Ekstre.exe
-
Size
1.3MB
-
MD5
076d5430af1ffea960bd52cfc641e99b
-
SHA1
aba1bf8a90fabe96565ecec2022d24e34626a921
-
SHA256
ee0fac5b1ab0a1e4c8efadea7919f8f1105d0928ca3a7c359a65af0246e06cf1
-
SHA512
50966bf59360c3a6a52716e3bb63a5d91bad4bd208241431ed15107ba94f40b4a6790042e0839ec8d63a3c521242032ad374b7511b5aa194eff5b063226d38bd
-
SSDEEP
24576:lTbBv5rUFcD6vbKBdqT4oDKvMrBW4eNTygt90e+hoyaxlI:PBH6vbKBUT4/vMr8jygt+0I
-
Snake Keylogger payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-