General
-
Target
SB0G28XC.bat.exe
-
Size
330KB
-
Sample
231030-ggamysda23
-
MD5
68ec81a206ccfd9346ab5f01ad9099ce
-
SHA1
28939cfbfbd6f4ad27a0107d8af960a66c0a1f89
-
SHA256
6ee1e5991a0d9c2fe23d62b4d13a6279cf121eb49c0675a23050fa5bceee9d37
-
SHA512
624fc52f7fdfb4c2b89cc8f21e405dbfcfcaf64223bb95f4f76eb2d18f9c23f0787603956c2ef1489b32510cd9ed045398987c5bead71fcc34dcb9097ca51827
-
SSDEEP
6144:5cOazRkHn3DeQLJhpSS4xfFYjtLYE2Odtyqd72frQQD:5cOazmqQLJ2n6JYrOiqo/
Static task
static1
Behavioral task
behavioral1
Sample
SB0G28XC.bat.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
SB0G28XC.bat.exe
Resource
win10v2004-20231020-en
Malware Config
Extracted
snakekeylogger
Protocol: ftp- Host:
ftp://ftp.resultsurex.com/ - Port:
21 - Username:
[email protected] - Password:
#M(J4[B0=%g8
https://api.telegram.org/bot6156533308:AAGhZIuuJLmTGWzMUHA3YxFXCaiT_llfToI/sendMessage?chat_id=5986156290
Targets
-
-
Target
SB0G28XC.bat.exe
-
Size
330KB
-
MD5
68ec81a206ccfd9346ab5f01ad9099ce
-
SHA1
28939cfbfbd6f4ad27a0107d8af960a66c0a1f89
-
SHA256
6ee1e5991a0d9c2fe23d62b4d13a6279cf121eb49c0675a23050fa5bceee9d37
-
SHA512
624fc52f7fdfb4c2b89cc8f21e405dbfcfcaf64223bb95f4f76eb2d18f9c23f0787603956c2ef1489b32510cd9ed045398987c5bead71fcc34dcb9097ca51827
-
SSDEEP
6144:5cOazRkHn3DeQLJhpSS4xfFYjtLYE2Odtyqd72frQQD:5cOazmqQLJ2n6JYrOiqo/
-
Snake Keylogger payload
-
Disables Task Manager via registry modification
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-