General
-
Target
9765435789te.exe
-
Size
809KB
-
Sample
230519-g1gwdaec6x
-
MD5
a1bcc030b3772680da1e842f616e6329
-
SHA1
ebf7a1a91c7143fa1f6a98b039dfc0238b7dc58b
-
SHA256
54492f6c2f298dd366978c41c40e603dc981e871d8fbbef854077652f787dde5
-
SHA512
087f28862949d8d65e799ce5f4e0012f8bc76326b42ff7b71b72e800b0e5ecdd6bc58c3e578c42f26d2aba7422015667c8bab8916367a3b653b0d939d4864a1d
-
SSDEEP
24576:dkcEILpX/dycnILpX/6zMu1yj5mjs0pW:dkcEILpX/dycnILpX/6zMu1yj5mj4
Static task
static1
Behavioral task
behavioral1
Sample
9765435789te.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
9765435789te.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5801425382:AAG5b4PUEaqNDv5uP9ejZGeIHeuzzOD4IHY/sendMessage?chat_id=5812329204
Targets
-
-
Target
9765435789te.exe
-
Size
809KB
-
MD5
a1bcc030b3772680da1e842f616e6329
-
SHA1
ebf7a1a91c7143fa1f6a98b039dfc0238b7dc58b
-
SHA256
54492f6c2f298dd366978c41c40e603dc981e871d8fbbef854077652f787dde5
-
SHA512
087f28862949d8d65e799ce5f4e0012f8bc76326b42ff7b71b72e800b0e5ecdd6bc58c3e578c42f26d2aba7422015667c8bab8916367a3b653b0d939d4864a1d
-
SSDEEP
24576:dkcEILpX/dycnILpX/6zMu1yj5mjs0pW:dkcEILpX/dycnILpX/6zMu1yj5mj4
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-