General
-
Target
a0b4a1c89699a189931bb1b43fa8e1bd.bin
-
Size
622KB
-
Sample
230602-cq2qkshd95
-
MD5
ad71968a3c15e96aa91d78741dc4bbb9
-
SHA1
47fd929831523edb3b58d265b01231acbc891f67
-
SHA256
063e1cc314b56802b04f158b572eb82cc278103ce5945414c9f29bdad33b1c00
-
SHA512
ac2ece25235910e2532ed0cdf2e7e2393e367ffa48a8a52ae8ecc4d3bd829117e3b06d26dd56a6f196095046a080eb1609fa43fd8fb62c2d287868cfcbbbd006
-
SSDEEP
12288:GHPXmHfbBefPDgV14qbf0Q1jkJgl5yvmM4xwWsFnxrAjY3LPKKQZEzeZJ+z:qmHlefPEV14FSjkJm5yvqxIxrakKKexE
Static task
static1
Behavioral task
behavioral1
Sample
d26f10eaa0513aec677c5aa206d6f8165a311840264d33c2c21ca6a5fb1e59e6.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
d26f10eaa0513aec677c5aa206d6f8165a311840264d33c2c21ca6a5fb1e59e6.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5912270480:AAEIuGgw_K5xnaqTgAZTKLKuD8iAYrUMk6E/sendMessage?chat_id=5739567068
Targets
-
-
Target
d26f10eaa0513aec677c5aa206d6f8165a311840264d33c2c21ca6a5fb1e59e6.exe
-
Size
986KB
-
MD5
a0b4a1c89699a189931bb1b43fa8e1bd
-
SHA1
f51aafc55d19536b20eee1b046fd06a4e40ba322
-
SHA256
d26f10eaa0513aec677c5aa206d6f8165a311840264d33c2c21ca6a5fb1e59e6
-
SHA512
a51ee8fe52010caa5f8fc7583527c8b53fec4a79ec1fa6fe53b904baf252d8bb350fa1ce54cb529604a758703d0ac0cf1e47f8e559456b81f9aa5c8a8bf257da
-
SSDEEP
12288:mfzAMTihh6xhZ6OrMHZ0RbPZoNgFI3q+HkSGKRpgTX7mR8qQHqPKuD:DMUgh8yS2PZ+g63hEpKREqFP
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-