General
-
Target
realbigcripted.exe
-
Size
733KB
-
Sample
230510-pswzbshg5s
-
MD5
cb8dcfba415f0cdd9c2e60474cc63c16
-
SHA1
e7d62f6742999d5882576c186b8dc4fcb4335a83
-
SHA256
c74b241653dd2fbda789f9198ab86773d71603ff64cce3356a4cbbd7f01ce2a4
-
SHA512
0be726b0d4424fe23699a16ffa3f855d0a06130e9adaf520dd0bd7bcfcc2a1b6fd17fd786a8161b90102a41829d326568673180bc51d9e4ca0ce943b74a67f21
-
SSDEEP
12288:oNZfTxdmSMpMbb2CYonIbZRKRx5vxZPvf3laE3Yn30LYNlJT3HJ0eYK4:oPL/iqlYonIFwfZPvFYEL8lt3H3YK
Static task
static1
Behavioral task
behavioral1
Sample
realbigcripted.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
realbigcripted.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5869797424:AAFj7jfdzfUw1CCCNzehFXiYeFWrzxnHnAs/sendMessage?chat_id=1715191138
Targets
-
-
Target
realbigcripted.exe
-
Size
733KB
-
MD5
cb8dcfba415f0cdd9c2e60474cc63c16
-
SHA1
e7d62f6742999d5882576c186b8dc4fcb4335a83
-
SHA256
c74b241653dd2fbda789f9198ab86773d71603ff64cce3356a4cbbd7f01ce2a4
-
SHA512
0be726b0d4424fe23699a16ffa3f855d0a06130e9adaf520dd0bd7bcfcc2a1b6fd17fd786a8161b90102a41829d326568673180bc51d9e4ca0ce943b74a67f21
-
SSDEEP
12288:oNZfTxdmSMpMbb2CYonIbZRKRx5vxZPvf3laE3Yn30LYNlJT3HJ0eYK4:oPL/iqlYonIFwfZPvFYEL8lt3H3YK
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-