General
-
Target
PO12052023.exe
-
Size
442KB
-
Sample
230513-gw1spaff42
-
MD5
cdb42137bf2343f39d1e65c5df1e6cba
-
SHA1
06b68d0b76988ccab1549f179afcdada4bfad092
-
SHA256
1c4551aa02efa75273b0243bdf8c3e5a10ddb8e8be2e7d513942ade0115011fc
-
SHA512
378ae4c0e233a74bc16c3ab039096d6b1a30952586c36a7c9e27c390749c4f3f5d5f9b171e2f55bb7458be4fb006d70c08dd233200bce7833e263e5ad8a7c5f2
-
SSDEEP
6144:R4sL+t1QILLCeLsWgn+vO6rZQ+yn1apMc40AvnhAp081nNVjqKoe:inxs9n+vO6VQ+e1apMcOv6nnjqKoe
Static task
static1
Behavioral task
behavioral1
Sample
PO12052023.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
PO12052023.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot6296181609:AAGAOhYH-dkTEQqHw-rWHbkpGOeR4Z7OA18/sendMessage?chat_id=1760125104
Targets
-
-
Target
PO12052023.exe
-
Size
442KB
-
MD5
cdb42137bf2343f39d1e65c5df1e6cba
-
SHA1
06b68d0b76988ccab1549f179afcdada4bfad092
-
SHA256
1c4551aa02efa75273b0243bdf8c3e5a10ddb8e8be2e7d513942ade0115011fc
-
SHA512
378ae4c0e233a74bc16c3ab039096d6b1a30952586c36a7c9e27c390749c4f3f5d5f9b171e2f55bb7458be4fb006d70c08dd233200bce7833e263e5ad8a7c5f2
-
SSDEEP
6144:R4sL+t1QILLCeLsWgn+vO6rZQ+yn1apMc40AvnhAp081nNVjqKoe:inxs9n+vO6VQ+e1apMcOv6nnjqKoe
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-