General
-
Target
49129798708280181c06bfbad.exe
-
Size
839KB
-
Sample
230709-sazt2seb9v
-
MD5
49129798708280181c06bfbad2588dc4
-
SHA1
616afee4d532afe61d2b17734070c991b748d3e1
-
SHA256
2cb7c9dc87cd618a4a307a8f7a054fc0acbb375e0dc2b3d041e5f5b9f138b601
-
SHA512
6fe7a77b828d24f8994700295731239a1712e64ada072066227bf74c6cd1806c905b8048a0c1a5a7367c6426c780a04764efb56fb3c02504c87b61bd2c9c5c52
-
SSDEEP
12288:paTVhXmdHpTWByppgEWLJ0cd5qWXPO6s/bT:UpOpTWBy8J0cDqWATT
Static task
static1
Behavioral task
behavioral1
Sample
49129798708280181c06bfbad.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
49129798708280181c06bfbad.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5825732293:AAE2qhbUfQUbm_3BbERMH_NFkrA1EHCGaiA/sendMessage?chat_id=6085461303
Targets
-
-
Target
49129798708280181c06bfbad.exe
-
Size
839KB
-
MD5
49129798708280181c06bfbad2588dc4
-
SHA1
616afee4d532afe61d2b17734070c991b748d3e1
-
SHA256
2cb7c9dc87cd618a4a307a8f7a054fc0acbb375e0dc2b3d041e5f5b9f138b601
-
SHA512
6fe7a77b828d24f8994700295731239a1712e64ada072066227bf74c6cd1806c905b8048a0c1a5a7367c6426c780a04764efb56fb3c02504c87b61bd2c9c5c52
-
SSDEEP
12288:paTVhXmdHpTWByppgEWLJ0cd5qWXPO6s/bT:UpOpTWBy8J0cDqWATT
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-