General
-
Target
23-010-04354.exe
-
Size
632KB
-
Sample
230628-rwaavahh72
-
MD5
28950d733a57f8b60d6c82be7c105d5d
-
SHA1
97215f12304287305f5d72bcc1cff6ea67a5388c
-
SHA256
cae1354a45569f45b407e95f00ba53ada314874b706f903f91960464c7f5ecea
-
SHA512
106b1283ff5352915751b5a9168102748d2f1a1eb50253a1680fbaadefc1d01a8b2d9e66281689d4e9a50459ad2bc705c4f9c95f7bd71e2387a5cc822288d6c7
-
SSDEEP
12288:gCXWldJ25/+cNSXq/LpXt3tmiDWkEuZlZ:g25/+cNSXqjpXt9a/ufZ
Static task
static1
Behavioral task
behavioral1
Sample
23-010-04354.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
23-010-04354.exe
Resource
win10v2004-20230621-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5884813542:AAE_NTHYHJxIqnVXOM0mUNE1h-A-ytq9y8I/sendMessage?chat_id=5334267822
Targets
-
-
Target
23-010-04354.exe
-
Size
632KB
-
MD5
28950d733a57f8b60d6c82be7c105d5d
-
SHA1
97215f12304287305f5d72bcc1cff6ea67a5388c
-
SHA256
cae1354a45569f45b407e95f00ba53ada314874b706f903f91960464c7f5ecea
-
SHA512
106b1283ff5352915751b5a9168102748d2f1a1eb50253a1680fbaadefc1d01a8b2d9e66281689d4e9a50459ad2bc705c4f9c95f7bd71e2387a5cc822288d6c7
-
SSDEEP
12288:gCXWldJ25/+cNSXq/LpXt3tmiDWkEuZlZ:g25/+cNSXqjpXt9a/ufZ
Score10/10-
Snake Keylogger payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-