General
-
Target
tmp
-
Size
496KB
-
Sample
230922-da27vacb5z
-
MD5
c6f8afa65badddd3590c98f05c766c01
-
SHA1
cd6a7f7ac3bcdcf9dcaf95235169a5c705559f04
-
SHA256
d7e0001b5c8e59c77d4f4cc467847498f7754d6417e7dbd592989ef73d90c5e6
-
SHA512
060378956b00517022a14810ddb1d10b98270a7556705a60c9203359b6a595ca924242b0d0099e317747ab45a90ab007177fbcff8db4fde3e5514ca6832ba56d
-
SSDEEP
12288:+0K7h3BwuJAK2lVWCG7FyODeqBRBCre9GFxenN97uKk:kbJWXEd6mBt0FxWRk
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot6316392918:AAHcjKTVDupG6SMH3LkXAeVBgHKlqsAcmRU/sendMessage?chat_id=6445748530
Targets
-
-
Target
tmp
-
Size
496KB
-
MD5
c6f8afa65badddd3590c98f05c766c01
-
SHA1
cd6a7f7ac3bcdcf9dcaf95235169a5c705559f04
-
SHA256
d7e0001b5c8e59c77d4f4cc467847498f7754d6417e7dbd592989ef73d90c5e6
-
SHA512
060378956b00517022a14810ddb1d10b98270a7556705a60c9203359b6a595ca924242b0d0099e317747ab45a90ab007177fbcff8db4fde3e5514ca6832ba56d
-
SSDEEP
12288:+0K7h3BwuJAK2lVWCG7FyODeqBRBCre9GFxenN97uKk:kbJWXEd6mBt0FxWRk
Score10/10-
Snake Keylogger payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-