General
-
Target
a5a04ecdd8c1133d7cbe18a889b2c133.exe
-
Size
1014KB
-
Sample
230526-f51nlsdh73
-
MD5
a5a04ecdd8c1133d7cbe18a889b2c133
-
SHA1
36b91fb92b5dd3d3021d05a6f31fa209aacf5b23
-
SHA256
9e8b3458e5a326cb4eec85e9d49536a0b4546e3226a7936cbc01a166bb238386
-
SHA512
3371145af11f299bcf22cc025533e94c67fe8abee37245746d96b2e30d00ebeee013a912f440cf935f3764b72fef39f89db999adf1bd31eff5da75dc8d8a0d87
-
SSDEEP
24576:+t+4ugP3pCe6rzYZyARFO1eMJ7GZivTgDx+nQ:p4jp16gOJyZwgD8nQ
Static task
static1
Behavioral task
behavioral1
Sample
a5a04ecdd8c1133d7cbe18a889b2c133.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
a5a04ecdd8c1133d7cbe18a889b2c133.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot6069996781:AAHmYgsHwRzaV1_6EovGh5IzcjEeVnsIkLk/sendMessage?chat_id=1734299596
Targets
-
-
Target
a5a04ecdd8c1133d7cbe18a889b2c133.exe
-
Size
1014KB
-
MD5
a5a04ecdd8c1133d7cbe18a889b2c133
-
SHA1
36b91fb92b5dd3d3021d05a6f31fa209aacf5b23
-
SHA256
9e8b3458e5a326cb4eec85e9d49536a0b4546e3226a7936cbc01a166bb238386
-
SHA512
3371145af11f299bcf22cc025533e94c67fe8abee37245746d96b2e30d00ebeee013a912f440cf935f3764b72fef39f89db999adf1bd31eff5da75dc8d8a0d87
-
SSDEEP
24576:+t+4ugP3pCe6rzYZyARFO1eMJ7GZivTgDx+nQ:p4jp16gOJyZwgD8nQ
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-