General
-
Target
18F5EA9F593E2F2E062123BF10FDCD8D7895D1997C10F8DC96A111E0A49E0059
-
Size
461KB
-
Sample
230518-cfes3ahc38
-
MD5
66786d1fa02ccace718078783db29722
-
SHA1
dc6fedd3d0c2e8cf1e42d12437e8554aec18d437
-
SHA256
18f5ea9f593e2f2e062123bf10fdcd8d7895d1997c10f8dc96a111e0a49e0059
-
SHA512
3c5180cd84c2f526497a9cc255049c75bbe05cf41db16d8cc7306a1a82099f22eb68dac7f02ab914c6ba26415dee3ba4cd686e4af1772b923410ef4774de8299
-
SSDEEP
6144:3anVyGKfz3xJwfQ4eRO8nyaf3OYPhrl1U7GP6bfXw4IOHpweCBf5TnkRSOM8f4Dp:NjjwItYoPxPhrl1d6TXw1hDcd4
Static task
static1
Behavioral task
behavioral1
Sample
fatura_25148.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
fatura_25148.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5900175150:AAEOWcHfBC8E-MpCblgzLaTu6oAl9xGi2Nc/sendMessage?chat_id=6236888590
Targets
-
-
Target
fatura_25148.exe
-
Size
558KB
-
MD5
0c6c529ac402229837a07c0d09d4b841
-
SHA1
79e24c6f76464478bd88c45b0d0dd50296d5fd07
-
SHA256
61242d372c2335940696dbf6d7ea85fbd95bd192d40a2e347faf43d9cbd04c82
-
SHA512
2e34857f9c8826a97c1ccf444ff18f4952847201e1bda66b323c610abe359e1e4fb0eb90e8a1488459f7dc6186baef1b6f772ff5ebb9eea06b2cb4b8a165de50
-
SSDEEP
6144:PYMbsEvycCJULPWzt7dfzWrrl1K7GPy9hXwCI8rpYeCBfPc7e51SLK1kF0mpk3A:PYov5+UzAWrrl1fyrXwb8QQe1kF0Ik3
-
Snake Keylogger payload
-
StormKitty payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-