General
-
Target
c55b05f72666b00a2153c92628979f2a.bin
-
Size
45KB
-
Sample
230611-ccq2xsha7z
-
MD5
4f8a8da1ced654572d65eca298b45f6e
-
SHA1
66b5b51aca67487604eb46c504482d2727d6c618
-
SHA256
7279b9c2a8cd5c76ff1b1a1cd3d9d0a0abcbc554ecebaa6c713f087bcd755c56
-
SHA512
fb1089e3844d4df3cce2810961a27ff50b495bf87866a7c34a4e1640fe95a4341b3dcadb36c68a09de87b3f7d1236bb35059cb3e8fd7a07f3b6579f2487292c1
-
SSDEEP
768:st87d8+GYksiOJHv0Zm0b82g9LNBO+UpNyrNLwGhrFc9G7VhlNYm6s:b7d8cJJcZENBhUpNy5hF7bf
Behavioral task
behavioral1
Sample
e7d13ec9ec5f7941487d13791dae5640ebac867970f1b855d812798032f91720.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e7d13ec9ec5f7941487d13791dae5640ebac867970f1b855d812798032f91720.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5945022662:AAH3tNDq2H4t2_2yAxq__TOQa3RMNliwRjM/sendMessage?chat_id=6147569474
Targets
-
-
Target
e7d13ec9ec5f7941487d13791dae5640ebac867970f1b855d812798032f91720.exe
-
Size
127KB
-
MD5
c55b05f72666b00a2153c92628979f2a
-
SHA1
d0419e3feb4215c08ab82853e6474f9b108438e3
-
SHA256
e7d13ec9ec5f7941487d13791dae5640ebac867970f1b855d812798032f91720
-
SHA512
a29026b90575b9bc62bd52aea64d74d18ffb100db0662335d520393f1ffe0f76fb635b67f0b4605fc35815ad76badc420a8786d5b7d07185f0b74ba7ea27ddd8
-
SSDEEP
3072:qOOYz2BVPhpxCsyYAbb7ZwHwBWjTWgbY:7ziG5buT3b
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-