General
-
Target
e5mvukHmGdh4pTY.exe
-
Size
582KB
-
Sample
230714-hgcb8adc7w
-
MD5
d3d4a0b23a01d10a64b578559d29d2fb
-
SHA1
0a91ef4aa1eef664e14075416ed9b0213f44ad0f
-
SHA256
1b6074d75cc84fcd24ad401c5706b1b77c1ef133a479f92e43153cbd8a952929
-
SHA512
b2b0926473a0657b276da0af1d3f3a354dfe766b9d0bd4a40e933115c6a39349b6bb5fe36452482960c92079df2feae98cae9077f3a943e7e11a9a3f1f7b34aa
-
SSDEEP
12288:FRPWqex/R7wwFCDRPjQU/oL6Fu/225NS9/t9:bWqe/wrsUZF+C
Static task
static1
Behavioral task
behavioral1
Sample
e5mvukHmGdh4pTY.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
e5mvukHmGdh4pTY.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot6321424110:AAF1dfphYwmA-T4WvI42NFm7yP7HSkS5Sy4/sendMessage?chat_id=6326865945
Targets
-
-
Target
e5mvukHmGdh4pTY.exe
-
Size
582KB
-
MD5
d3d4a0b23a01d10a64b578559d29d2fb
-
SHA1
0a91ef4aa1eef664e14075416ed9b0213f44ad0f
-
SHA256
1b6074d75cc84fcd24ad401c5706b1b77c1ef133a479f92e43153cbd8a952929
-
SHA512
b2b0926473a0657b276da0af1d3f3a354dfe766b9d0bd4a40e933115c6a39349b6bb5fe36452482960c92079df2feae98cae9077f3a943e7e11a9a3f1f7b34aa
-
SSDEEP
12288:FRPWqex/R7wwFCDRPjQU/oL6Fu/225NS9/t9:bWqe/wrsUZF+C
Score10/10-
Snake Keylogger payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-