General
-
Target
07912499.exe
-
Size
134KB
-
Sample
230601-sd9teseh55
-
MD5
fb08d5b98542effd996cf4dd0e388666
-
SHA1
df1fa3681fa3508829ca60357e3ad86df7f488e6
-
SHA256
21a26f3536172cb4f2f597eb7794578e7fda662d54d96e4e70da37a49348d454
-
SHA512
558a338c8ca69149962ae37a670a822365789b5b277aaa8e1bb77d7254def3d3dbf513e3d7448fa3221e5b31efc2b9d72fab3675b5a67fa3d2875318b983c4a4
-
SSDEEP
3072:VWhpKNbGL5ylAan+qHavsSHdUkFVgII4BWhf0ocPrr:VvNbGLVan+VvdHZLE2vr
Static task
static1
Behavioral task
behavioral1
Sample
07912499.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
07912499.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot6184780923:AAHbCGrBU_2zg9A-73yTyKKCMGf1tkzUFbM/sendMessage?chat_id=759814203
Targets
-
-
Target
07912499.exe
-
Size
134KB
-
MD5
fb08d5b98542effd996cf4dd0e388666
-
SHA1
df1fa3681fa3508829ca60357e3ad86df7f488e6
-
SHA256
21a26f3536172cb4f2f597eb7794578e7fda662d54d96e4e70da37a49348d454
-
SHA512
558a338c8ca69149962ae37a670a822365789b5b277aaa8e1bb77d7254def3d3dbf513e3d7448fa3221e5b31efc2b9d72fab3675b5a67fa3d2875318b983c4a4
-
SSDEEP
3072:VWhpKNbGL5ylAan+qHavsSHdUkFVgII4BWhf0ocPrr:VvNbGLVan+VvdHZLE2vr
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-