General
-
Target
23bccc733779e2c39a4ce431a77b9f3317817972fc118f70ce59b735d98fe89f
-
Size
153KB
-
Sample
230606-esb9tace7w
-
MD5
650de0e3d5a76ee569312726b2ccd79e
-
SHA1
5e11c60e34e4646f6fcfc210709c8a4c83e37ec9
-
SHA256
23bccc733779e2c39a4ce431a77b9f3317817972fc118f70ce59b735d98fe89f
-
SHA512
d248cc963f4ce1c5034bb9c7e0971b1607b2228a71b60e8880eeff17f06797b47db63ca5b2568e9f8b9554e468a32e27930c926e2fcb4b82e10590e2ef11a2b3
-
SSDEEP
3072:SVQAASLDjgl/8mgT9O4sP3fxEdXVCP9mPc7X9tMHjCSI8KGLQT3:SqA7LD6/6T9O/v+X56MOSI8KGLQT
Static task
static1
Behavioral task
behavioral1
Sample
23bccc733779e2c39a4ce431a77b9f3317817972fc118f70ce59b735d98fe89f.exe
Resource
win10v2004-20230220-en
Malware Config
Targets
-
-
Target
23bccc733779e2c39a4ce431a77b9f3317817972fc118f70ce59b735d98fe89f
-
Size
153KB
-
MD5
650de0e3d5a76ee569312726b2ccd79e
-
SHA1
5e11c60e34e4646f6fcfc210709c8a4c83e37ec9
-
SHA256
23bccc733779e2c39a4ce431a77b9f3317817972fc118f70ce59b735d98fe89f
-
SHA512
d248cc963f4ce1c5034bb9c7e0971b1607b2228a71b60e8880eeff17f06797b47db63ca5b2568e9f8b9554e468a32e27930c926e2fcb4b82e10590e2ef11a2b3
-
SSDEEP
3072:SVQAASLDjgl/8mgT9O4sP3fxEdXVCP9mPc7X9tMHjCSI8KGLQT3:SqA7LD6/6T9O/v+X56MOSI8KGLQT
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-