General
-
Target
proformainvoiceexe.exe
-
Size
150KB
-
Sample
230704-repzzadg76
-
MD5
0159cbc7fb49f61e2a46b998cf49cd3c
-
SHA1
c26b23ec7aa5e097e9be39319d474a86580a038a
-
SHA256
074f4cf5b5fa0260e1fc48c591ee900246aa3cc382e3019c55cde7aea428b508
-
SHA512
156f63efd2a8e815de3cfe61dda17462ef365382b283a7ae0f83a6e40482ff0448717c25924e691d5f7de960830120aa81f0e55fdc12d664a15283244643b723
-
SSDEEP
3072:HfY/TU9fE9PEtuBbVChm2hJerF6QMznvEgXlvvdGGVCmfe91X+jcHLTngg6:/Ya6PViy6QMzn8KtECdU1Xecrj96
Static task
static1
Behavioral task
behavioral1
Sample
proformainvoiceexe.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
proformainvoiceexe.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot1507062795:AAEBb0H5OYbp-dWwXk8ffQp0InjOhKxhpbU/sendMessage?chat_id=1663822858
Targets
-
-
Target
proformainvoiceexe.exe
-
Size
150KB
-
MD5
0159cbc7fb49f61e2a46b998cf49cd3c
-
SHA1
c26b23ec7aa5e097e9be39319d474a86580a038a
-
SHA256
074f4cf5b5fa0260e1fc48c591ee900246aa3cc382e3019c55cde7aea428b508
-
SHA512
156f63efd2a8e815de3cfe61dda17462ef365382b283a7ae0f83a6e40482ff0448717c25924e691d5f7de960830120aa81f0e55fdc12d664a15283244643b723
-
SSDEEP
3072:HfY/TU9fE9PEtuBbVChm2hJerF6QMznvEgXlvvdGGVCmfe91X+jcHLTngg6:/Ya6PViy6QMzn8KtECdU1Xecrj96
-
Snake Keylogger payload
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-