General
-
Target
ORDER#3102769.exe
-
Size
1.0MB
-
Sample
230602-qk3ycabh9s
-
MD5
258e6c5f251cbe3fad2bb9fa43386ce8
-
SHA1
cfd52b2f3b2bbaab92fea9b29efa48610646cdb5
-
SHA256
c70b193a2cfb726c02359b7acd2fc0d5c59986b9f24058e1f3bb37767fa944e4
-
SHA512
84eb8bd4afe04d4daae65388a16566e3ad0c2b0e081cfa8a1c5e63b6bea96bce855b13bfb2f2764b5fc83707ef287f0101f70d1758d7d95691bebc2f08614192
-
SSDEEP
24576:ub1U9BqmycgiH75B1fXEakWUFQQufG6eMU:0u9Bqmycr71fDUFQQufplU
Static task
static1
Behavioral task
behavioral1
Sample
ORDER#3102769.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ORDER#3102769.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5587666659:AAG8NrrXJQs__dhk8nLJBFOspz2my8OVpX0/sendMessage?chat_id=5569775004
Targets
-
-
Target
ORDER#3102769.exe
-
Size
1.0MB
-
MD5
258e6c5f251cbe3fad2bb9fa43386ce8
-
SHA1
cfd52b2f3b2bbaab92fea9b29efa48610646cdb5
-
SHA256
c70b193a2cfb726c02359b7acd2fc0d5c59986b9f24058e1f3bb37767fa944e4
-
SHA512
84eb8bd4afe04d4daae65388a16566e3ad0c2b0e081cfa8a1c5e63b6bea96bce855b13bfb2f2764b5fc83707ef287f0101f70d1758d7d95691bebc2f08614192
-
SSDEEP
24576:ub1U9BqmycgiH75B1fXEakWUFQQufG6eMU:0u9Bqmycr71fDUFQQufplU
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-