General
-
Target
file.exe
-
Size
137KB
-
Sample
230602-qthnrsbe95
-
MD5
1ba7ea81ce6384aa8ce61f8295c5822a
-
SHA1
82284495fdbd08fa814429cfede4ad5d7a413588
-
SHA256
62e28e9fdfdefd8ba9053db4a21628873dbf8abaa58b35afe7ac5d43f552d22e
-
SHA512
01465724031139a42929f758fe84d305aca6d556b05d5d40e2271de96f26306968bc8b99a9cc39c4291f564a192a9618bb29348f82e570711c2cae630ff16f06
-
SSDEEP
3072:4hWH1chErLxYflYXp1Xz//OM94bon1UbzfEM+Xo78nT:e+chwVYUnT/TgonKbj+Xc
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot6184780923:AAHbCGrBU_2zg9A-73yTyKKCMGf1tkzUFbM/sendMessage?chat_id=759814203
Targets
-
-
Target
file.exe
-
Size
137KB
-
MD5
1ba7ea81ce6384aa8ce61f8295c5822a
-
SHA1
82284495fdbd08fa814429cfede4ad5d7a413588
-
SHA256
62e28e9fdfdefd8ba9053db4a21628873dbf8abaa58b35afe7ac5d43f552d22e
-
SHA512
01465724031139a42929f758fe84d305aca6d556b05d5d40e2271de96f26306968bc8b99a9cc39c4291f564a192a9618bb29348f82e570711c2cae630ff16f06
-
SSDEEP
3072:4hWH1chErLxYflYXp1Xz//OM94bon1UbzfEM+Xo78nT:e+chwVYUnT/TgonKbj+Xc
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-