General
-
Target
NEAS.NEASNEASfffc596389cada3bd1e1d1659029e607e14320cbdd126de7fdbe33b99f9c59d7exeexeexe_JC.exe
-
Size
533KB
-
Sample
231018-xtf89saa6x
-
MD5
91b3358aed52598ec71ce12e626c2c11
-
SHA1
fd0213e5acf681ea21bc829cb8fc6fc701312f56
-
SHA256
fffc596389cada3bd1e1d1659029e607e14320cbdd126de7fdbe33b99f9c59d7
-
SHA512
454b46d863c090e56b1475e9958067d29fa972d74dae1b6f0eac0e3ff9abf9fc45af86452b76fd9a1a866c5969c7c97bc009f5f608255657f7b806292fbfc84c
-
SSDEEP
12288:aZDJ92Igq/oEzwqrAjWOAlvH+OzSgbuu7DR8wOezpo+J902C:I/LnzwqrAjTyvHBzR/IezH
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.NEASNEASfffc596389cada3bd1e1d1659029e607e14320cbdd126de7fdbe33b99f9c59d7exeexeexe_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.NEASNEASfffc596389cada3bd1e1d1659029e607e14320cbdd126de7fdbe33b99f9c59d7exeexeexe_JC.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot6419786954:AAG-8viGVDoGmC2CrUGDLpxfgdrqnRKve-8/sendMessage?chat_id=6465958501
Targets
-
-
Target
NEAS.NEASNEASfffc596389cada3bd1e1d1659029e607e14320cbdd126de7fdbe33b99f9c59d7exeexeexe_JC.exe
-
Size
533KB
-
MD5
91b3358aed52598ec71ce12e626c2c11
-
SHA1
fd0213e5acf681ea21bc829cb8fc6fc701312f56
-
SHA256
fffc596389cada3bd1e1d1659029e607e14320cbdd126de7fdbe33b99f9c59d7
-
SHA512
454b46d863c090e56b1475e9958067d29fa972d74dae1b6f0eac0e3ff9abf9fc45af86452b76fd9a1a866c5969c7c97bc009f5f608255657f7b806292fbfc84c
-
SSDEEP
12288:aZDJ92Igq/oEzwqrAjWOAlvH+OzSgbuu7DR8wOezpo+J902C:I/LnzwqrAjTyvHBzR/IezH
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-