General
-
Target
a5395961ee5eeddf2c81583e2eb11dafe8f8ebcc350204e0c8344e4d3e1614e6_JC.exe
-
Size
925KB
-
Sample
231011-2ezvaaaf62
-
MD5
6dd5b074dc21fc159a5e98c448dab3e5
-
SHA1
9be431a3d0fb17e0d7b69c62d288a7b47804fd36
-
SHA256
a5395961ee5eeddf2c81583e2eb11dafe8f8ebcc350204e0c8344e4d3e1614e6
-
SHA512
bbd3ea1bbe5e44f04973389ca391eab78f456a673fee59bbeed8368462dbc5a819bd5c929f8e5103337e3beb82002aeca5bc80ff25d3741fbe46c05c74e909db
-
SSDEEP
12288:8IOZByuDs0aOFF9EcBeK4cwyLO/uVvrvhytVJJbngUJo37DV4ELPr0MecveyyOGp:aoeeK4PmtuJUw4np3HLcp
Static task
static1
Behavioral task
behavioral1
Sample
a5395961ee5eeddf2c81583e2eb11dafe8f8ebcc350204e0c8344e4d3e1614e6_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
a5395961ee5eeddf2c81583e2eb11dafe8f8ebcc350204e0c8344e4d3e1614e6_JC.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot6576397218:AAGKDzpigihdpxoThh04ULC6usDNBiyjVcE/sendMessage?chat_id=5086753017
Targets
-
-
Target
a5395961ee5eeddf2c81583e2eb11dafe8f8ebcc350204e0c8344e4d3e1614e6_JC.exe
-
Size
925KB
-
MD5
6dd5b074dc21fc159a5e98c448dab3e5
-
SHA1
9be431a3d0fb17e0d7b69c62d288a7b47804fd36
-
SHA256
a5395961ee5eeddf2c81583e2eb11dafe8f8ebcc350204e0c8344e4d3e1614e6
-
SHA512
bbd3ea1bbe5e44f04973389ca391eab78f456a673fee59bbeed8368462dbc5a819bd5c929f8e5103337e3beb82002aeca5bc80ff25d3741fbe46c05c74e909db
-
SSDEEP
12288:8IOZByuDs0aOFF9EcBeK4cwyLO/uVvrvhytVJJbngUJo37DV4ELPr0MecveyyOGp:aoeeK4PmtuJUw4np3HLcp
Score10/10-
Snake Keylogger payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-