General
-
Target
Drawings.pif.exe
-
Size
366KB
-
Sample
231022-h8dpcsea9w
-
MD5
1a691869fcecce8373212a390d1fa3e3
-
SHA1
a952c873d4b825940b012e2d0ceb849dd9634d64
-
SHA256
b423c0f05afa1b0e32ba18a552ac0d4020bb69a055602c94323d5bbd4c9cefa8
-
SHA512
6bcac7d3fd19a60fb7c6a52d67cc0a6d8f7684f0a2fa428647a0cc1a03fb2d25c9a0b75b215de432df81113e951c2442ec1b793c93e68f6b99ae6ef7ba62fe5e
-
SSDEEP
6144:L0nJBIKD2SJMz2dR8rZNlvzbV+dHhZdZcZmPaFTPM+OAHhBMdk6ceh9X3P9t0G:sJfD2S+nRbV+dHhZdZcZm2TPZHhBak6I
Static task
static1
Behavioral task
behavioral1
Sample
Drawings.pif.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Drawings.pif.exe
Resource
win10v2004-20231020-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot6243209595:AAGECSmdSqJiVZcdFoBvotoaKcKT9Lz5Gvw/sendMessage?chat_id=1070926352
Targets
-
-
Target
Drawings.pif.exe
-
Size
366KB
-
MD5
1a691869fcecce8373212a390d1fa3e3
-
SHA1
a952c873d4b825940b012e2d0ceb849dd9634d64
-
SHA256
b423c0f05afa1b0e32ba18a552ac0d4020bb69a055602c94323d5bbd4c9cefa8
-
SHA512
6bcac7d3fd19a60fb7c6a52d67cc0a6d8f7684f0a2fa428647a0cc1a03fb2d25c9a0b75b215de432df81113e951c2442ec1b793c93e68f6b99ae6ef7ba62fe5e
-
SSDEEP
6144:L0nJBIKD2SJMz2dR8rZNlvzbV+dHhZdZcZmPaFTPM+OAHhBMdk6ceh9X3P9t0G:sJfD2S+nRbV+dHhZdZcZm2TPZHhBak6I
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-