General
-
Target
MPS20220928742916.exe
-
Size
208KB
-
Sample
230929-kqs3fagh4s
-
MD5
906f03b109ba170f2341cada8115cace
-
SHA1
b6617a4b65eaed21d1284a468fe2ea71ced24092
-
SHA256
6c933d73454be8f55f59a321448496e742fb71513a6fab732426938f0f023206
-
SHA512
68373aa271522db5650313e383e20f04fd087509059c2aa3430984979687688438c1f9b42402c778639f21daf632cd785ffb56f15a8cdcf58abdb4eec1c2deb9
-
SSDEEP
3072:2vaIKVCDtw15bY5kThyItji8s+HXStsxal4MAXXnm4ZQvq2TIE8ET:2TvDtwg5kLtji8sOaljAnnm4WHgE
Static task
static1
Behavioral task
behavioral1
Sample
MPS20220928742916.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
MPS20220928742916.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot6353838065:AAFw-dmIrW4AukRvprM9LipsTyBb8iZ9FxM/sendMessage?chat_id=1467583453
Targets
-
-
Target
MPS20220928742916.exe
-
Size
208KB
-
MD5
906f03b109ba170f2341cada8115cace
-
SHA1
b6617a4b65eaed21d1284a468fe2ea71ced24092
-
SHA256
6c933d73454be8f55f59a321448496e742fb71513a6fab732426938f0f023206
-
SHA512
68373aa271522db5650313e383e20f04fd087509059c2aa3430984979687688438c1f9b42402c778639f21daf632cd785ffb56f15a8cdcf58abdb4eec1c2deb9
-
SSDEEP
3072:2vaIKVCDtw15bY5kThyItji8s+HXStsxal4MAXXnm4ZQvq2TIE8ET:2TvDtwg5kLtji8sOaljAnnm4WHgE
-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-