General
-
Target
SKM22882023 pdf.exe
-
Size
1.0MB
-
Sample
230522-wx6gwscf5w
-
MD5
8eecb7d05b0685f6547d2f527a3256e3
-
SHA1
e04a91a8cffb045aec3a96612788b5e9c43e3165
-
SHA256
8e697aa7f5271c0c246970f87c2974f29e70b4ba54a2f7ff187ba7bc2e234075
-
SHA512
a47fe3383a9bbe96110cb33f7c66466b44e3c1b3fd9e421792350e5e8495c5738a0f2b409e67f29312d91ddc65dc49326918fee67e5d64ce4a63b40da3879b3f
-
SSDEEP
24576:DR1oOfJKY9rrOG8ygWoo89Dhfcjo3PpaXz90G15UbC5JZ:D1b9e7CQhUjo3PpaB0w9JZ
Static task
static1
Behavioral task
behavioral1
Sample
SKM22882023 pdf.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
SKM22882023 pdf.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot6069996781:AAHmYgsHwRzaV1_6EovGh5IzcjEeVnsIkLk/sendMessage?chat_id=1734299596
Targets
-
-
Target
SKM22882023 pdf.exe
-
Size
1.0MB
-
MD5
8eecb7d05b0685f6547d2f527a3256e3
-
SHA1
e04a91a8cffb045aec3a96612788b5e9c43e3165
-
SHA256
8e697aa7f5271c0c246970f87c2974f29e70b4ba54a2f7ff187ba7bc2e234075
-
SHA512
a47fe3383a9bbe96110cb33f7c66466b44e3c1b3fd9e421792350e5e8495c5738a0f2b409e67f29312d91ddc65dc49326918fee67e5d64ce4a63b40da3879b3f
-
SSDEEP
24576:DR1oOfJKY9rrOG8ygWoo89Dhfcjo3PpaXz90G15UbC5JZ:D1b9e7CQhUjo3PpaB0w9JZ
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-