General
-
Target
c6831026773fa273685bd3b584d18e6a.bin
-
Size
532KB
-
Sample
231029-csh19aga38
-
MD5
c5e2f48e5c9a92caefec14b8511254cc
-
SHA1
9c02e83885981b00db49fe61669d8c1d2a672815
-
SHA256
f1411667e4e147f14639180da7ce67bb7182be34770104a748882e4eb077cb96
-
SHA512
41c1c7ac60f2a4c9c023c341b7903a8a7a691eeda12e734e8be8f6bff0d6be797ccd23d2552c36cc4825ac64fa3a5ec6b70617ce7ab7580c8ea223d53927e220
-
SSDEEP
12288:CIfhkcYPu0+xGS2yjT8u4fmjFV9e4x0VB9IyVee1k19fJL:CIpkc/pr4OFL3QB+/e1k19x
Static task
static1
Behavioral task
behavioral1
Sample
1cdba11094ae2b0b93b98bff9c6714293a14cb61bbe21a5a851a08d6e89507ce.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
1cdba11094ae2b0b93b98bff9c6714293a14cb61bbe21a5a851a08d6e89507ce.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot6248535023:AAEvCpw2Gs0HsAiSElW_xTdLU8K-oKbc0LU/sendMessage?chat_id=2076143622
Targets
-
-
Target
1cdba11094ae2b0b93b98bff9c6714293a14cb61bbe21a5a851a08d6e89507ce.exe
-
Size
644KB
-
MD5
c6831026773fa273685bd3b584d18e6a
-
SHA1
5e10090f47262a60fe3c0d2da9cf45d63bf2bf29
-
SHA256
1cdba11094ae2b0b93b98bff9c6714293a14cb61bbe21a5a851a08d6e89507ce
-
SHA512
82d74e72bf7e46fa529fcaac3f546bace51808f38cfc864712bc35c826388c0ea6e445f6aa33f917fa3cd0cf33dff814e5f80047a5e82b8027301bfe96537b2c
-
SSDEEP
12288:HPkiCBMR3tzaiJmgMK8nINpJ1voXE58rWc44wkOnnehXixdn2OJLR2W9XjE1rH1Y:8irtzazvGfvoXEoWMGnezOT
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-