General
-
Target
fb6436801517f4cb1748ba4bf9df2df4.exe
-
Size
542KB
-
Sample
231012-clxwtshh6t
-
MD5
fb6436801517f4cb1748ba4bf9df2df4
-
SHA1
2c36e323268892dc7f9987fb5200ee1fb2336df0
-
SHA256
f8e42f0b33b357352164af46809b4ba2fd3f213059b4f7d1a38c9df1e84e6b12
-
SHA512
77140f0e92be4f7b931f33949ef4640b8d02bebcc43e0aec97618eb731efb07acb0648efcc10af630f2440bc2c8fa45b3862b8d77ce5c3f9d908ac9b22bf6977
-
SSDEEP
12288:5tHparD6dh85k4Y5hLZwi3qjnb7svMufuul8ZxeizmFzx:h4Dqh5LPwi3YnsUufuLnRmH
Static task
static1
Behavioral task
behavioral1
Sample
fb6436801517f4cb1748ba4bf9df2df4.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
fb6436801517f4cb1748ba4bf9df2df4.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot6316392918:AAHcjKTVDupG6SMH3LkXAeVBgHKlqsAcmRU/sendMessage?chat_id=6445748530
Targets
-
-
Target
fb6436801517f4cb1748ba4bf9df2df4.exe
-
Size
542KB
-
MD5
fb6436801517f4cb1748ba4bf9df2df4
-
SHA1
2c36e323268892dc7f9987fb5200ee1fb2336df0
-
SHA256
f8e42f0b33b357352164af46809b4ba2fd3f213059b4f7d1a38c9df1e84e6b12
-
SHA512
77140f0e92be4f7b931f33949ef4640b8d02bebcc43e0aec97618eb731efb07acb0648efcc10af630f2440bc2c8fa45b3862b8d77ce5c3f9d908ac9b22bf6977
-
SSDEEP
12288:5tHparD6dh85k4Y5hLZwi3qjnb7svMufuul8ZxeizmFzx:h4Dqh5LPwi3YnsUufuLnRmH
Score10/10-
Snake Keylogger payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-