General
-
Target
Kjcudd.exe
-
Size
13KB
-
Sample
230530-hm6s1sgb7s
-
MD5
a2e2465b44a5b76191696483522ce78b
-
SHA1
60c31de9330a5a349f44b333cc247b96c40cf72e
-
SHA256
60c5b8fc203fab56c0c8077ef880ec749441e65f9fbc5be6b252ed5718166c2f
-
SHA512
69a6245afafea2004511eb183da176ef764d561ad5854ed6ba1fdcde8f86bda6fd5658845e0cd3e51090605e7b5ef4b82c2f8cb9e2b7cac9f37c48b255630a04
-
SSDEEP
192:g6orT3RCYfI8WxhNEv9Xd8LC3RsB3L7gU9qkLeIg:g5DfL+NK8LChGhqkLeI
Static task
static1
Behavioral task
behavioral1
Sample
Kjcudd.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Kjcudd.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5996089921:AAFFEnbgTY8Gt8G5jJy6llKhDg_Ha193t7c/sendMessage?chat_id=2054148913
Targets
-
-
Target
Kjcudd.exe
-
Size
13KB
-
MD5
a2e2465b44a5b76191696483522ce78b
-
SHA1
60c31de9330a5a349f44b333cc247b96c40cf72e
-
SHA256
60c5b8fc203fab56c0c8077ef880ec749441e65f9fbc5be6b252ed5718166c2f
-
SHA512
69a6245afafea2004511eb183da176ef764d561ad5854ed6ba1fdcde8f86bda6fd5658845e0cd3e51090605e7b5ef4b82c2f8cb9e2b7cac9f37c48b255630a04
-
SSDEEP
192:g6orT3RCYfI8WxhNEv9Xd8LC3RsB3L7gU9qkLeIg:g5DfL+NK8LChGhqkLeI
Score10/10-
Snake Keylogger payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-