General
-
Target
proforma Invoice.pdf.z
-
Size
921KB
-
Sample
230607-pncd5aad66
-
MD5
1e25aa999c0fa54f44e6f61f5ecabf90
-
SHA1
9120f0b597f035d267ef7b8ead73a178612699e8
-
SHA256
38a40add079a4dfbaf33406c9fb38ed051c98799a9f100444a291bbe2e483827
-
SHA512
7a83da7aa6f8ffc8f2c39193b4594b855ac57568ba3125cb018fba7dca3ae63dbb5f934ba44c9b1736c8ad352aaf2c79f594d927fcab1838b68beed99c57512c
-
SSDEEP
24576:roZFSBkrAEWY53Yf9jfPML2AtKOWacbVXCi6:roiSH3Yf9j2tKOWacbwi6
Static task
static1
Behavioral task
behavioral1
Sample
proforma Invoice.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
proforma Invoice.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot6288005341:AAGRgYv2o5lUGc3tnZ9QIy4L5Vg9lraTrSs/sendMessage?chat_id=6121807451
Targets
-
-
Target
proforma Invoice.exe
-
Size
1002KB
-
MD5
519a4362bd2e58ed1dc658ea0b4c2b34
-
SHA1
21ab5eba93ba582c75cd2966114fd4424c61af03
-
SHA256
1174a36a1437a563b6d80ea0ace862adecdbd91817bee7e845cbaac144e02df6
-
SHA512
28c030a67b8292815dbc307f7126e343e87721dbb80a79655ff4e5af275b7589fca3d2ab18e90f3e5ea8d82cc2fd21d919cb723f20603897c520a50f86eb4adc
-
SSDEEP
24576:g/4URo28cZI5QWvCpEwtmvxk+wSu1purOtYL+:g/QcWQz+wtR+zirtn
Score10/10-
Snake Keylogger payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-