General
-
Target
6f56162ccaafdd99cd623a0e3b23dc91.exe
-
Size
535KB
-
Sample
231218-g1fy3saga3
-
MD5
6f56162ccaafdd99cd623a0e3b23dc91
-
SHA1
526fc6fed2734db26c8c49f1d42ec97fe991217f
-
SHA256
3e43fe5dce47c5a3115320ac38040f4b6367e58356a06810ca638579da1bf3d1
-
SHA512
732c79efec4821605ee30c86206b4fa16f0da19e07468ad8a78c0ca2218dc271bb2967c9354f9e4ae91fc0f767380781dfc510c0e7db59c53b0f5fe46898fef3
-
SSDEEP
12288:x2iNb0oLteLG3GdEHillLnCaF4dQqbe8RwQFXk:x16gkLMGdE015xFgxq
Static task
static1
Behavioral task
behavioral1
Sample
6f56162ccaafdd99cd623a0e3b23dc91.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6f56162ccaafdd99cd623a0e3b23dc91.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
6f56162ccaafdd99cd623a0e3b23dc91.exe
-
Size
535KB
-
MD5
6f56162ccaafdd99cd623a0e3b23dc91
-
SHA1
526fc6fed2734db26c8c49f1d42ec97fe991217f
-
SHA256
3e43fe5dce47c5a3115320ac38040f4b6367e58356a06810ca638579da1bf3d1
-
SHA512
732c79efec4821605ee30c86206b4fa16f0da19e07468ad8a78c0ca2218dc271bb2967c9354f9e4ae91fc0f767380781dfc510c0e7db59c53b0f5fe46898fef3
-
SSDEEP
12288:x2iNb0oLteLG3GdEHillLnCaF4dQqbe8RwQFXk:x16gkLMGdE015xFgxq
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-