General
-
Target
1ba7ea81ce6384aa8ce61f8295c5822a.bin
-
Size
104KB
-
Sample
230605-l9l9nsgd4y
-
MD5
4efa49984aa0148cbc6de4cfe54f58f0
-
SHA1
c7f74bc696758a78c9c8fa0ea4057191d6a32e64
-
SHA256
6d37839c8dca16fbcef8644549c42e2ca0d08f1f860ffb61b62d770cadd1dc17
-
SHA512
f8090d9a0d054a0c143d015176688dd611c5ddd04a5fe72d9aa8f31f261490ca4535b59d50c35769afa09adf66dc1e67b5150b607d79176868c7da79ce87678a
-
SSDEEP
3072:NXK43I3UXDczshMqO9WrzdX+2hoG8GRihpliwQx:FK43XEsDOI3xhHsHLQx
Static task
static1
Behavioral task
behavioral1
Sample
62e28e9fdfdefd8ba9053db4a21628873dbf8abaa58b35afe7ac5d43f552d22e.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
62e28e9fdfdefd8ba9053db4a21628873dbf8abaa58b35afe7ac5d43f552d22e.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot6184780923:AAHbCGrBU_2zg9A-73yTyKKCMGf1tkzUFbM/sendMessage?chat_id=759814203
Targets
-
-
Target
62e28e9fdfdefd8ba9053db4a21628873dbf8abaa58b35afe7ac5d43f552d22e.exe
-
Size
137KB
-
MD5
1ba7ea81ce6384aa8ce61f8295c5822a
-
SHA1
82284495fdbd08fa814429cfede4ad5d7a413588
-
SHA256
62e28e9fdfdefd8ba9053db4a21628873dbf8abaa58b35afe7ac5d43f552d22e
-
SHA512
01465724031139a42929f758fe84d305aca6d556b05d5d40e2271de96f26306968bc8b99a9cc39c4291f564a192a9618bb29348f82e570711c2cae630ff16f06
-
SSDEEP
3072:4hWH1chErLxYflYXp1Xz//OM94bon1UbzfEM+Xo78nT:e+chwVYUnT/TgonKbj+Xc
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-