General
-
Target
a8f6bb96902e03a8e356c6bd5650a401.exe
-
Size
670KB
-
Sample
230515-gva6mshc7w
-
MD5
a8f6bb96902e03a8e356c6bd5650a401
-
SHA1
aa68320445b3c8ba82fe34c3f2d8b8d5eb75fce6
-
SHA256
15e2b1d8d7ec96acece7e015ec8588bec907b02945c8e20e59c1e84c039bae69
-
SHA512
848268f6cc515fcb31078dcd29ab9c71a0ea34bb1011efc3081e5dd1a8798ba896c19efec1d5f99bfdb5cb9c25035f21930080fe2bb2bd164122d4d3791b4941
-
SSDEEP
12288:AP6MAZf3lZSUaId9NvyotGcmby7bXV5uXNikOm76Jm52V+NUgK:Aqv6yftfZ5mik971AVXgK
Static task
static1
Behavioral task
behavioral1
Sample
a8f6bb96902e03a8e356c6bd5650a401.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
a8f6bb96902e03a8e356c6bd5650a401.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5861540471:AAFXCiZSJXtn5JonLHiv4xaz5kAYhSl9Ymg/sendMessage?chat_id=5010941489
Targets
-
-
Target
a8f6bb96902e03a8e356c6bd5650a401.exe
-
Size
670KB
-
MD5
a8f6bb96902e03a8e356c6bd5650a401
-
SHA1
aa68320445b3c8ba82fe34c3f2d8b8d5eb75fce6
-
SHA256
15e2b1d8d7ec96acece7e015ec8588bec907b02945c8e20e59c1e84c039bae69
-
SHA512
848268f6cc515fcb31078dcd29ab9c71a0ea34bb1011efc3081e5dd1a8798ba896c19efec1d5f99bfdb5cb9c25035f21930080fe2bb2bd164122d4d3791b4941
-
SSDEEP
12288:AP6MAZf3lZSUaId9NvyotGcmby7bXV5uXNikOm76Jm52V+NUgK:Aqv6yftfZ5mik971AVXgK
-
Snake Keylogger payload
-
StormKitty payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-