General
-
Target
bb45f1bdc9fe6babe14afc4c9cd060c5
-
Size
418KB
-
Sample
231220-q1ynkaabbj
-
MD5
bb45f1bdc9fe6babe14afc4c9cd060c5
-
SHA1
4ba0d55837412391aa005ee84293c4319308e24c
-
SHA256
601f5c6aca3e36d0b443c83549e7cd373701647db9509d0a8ac0f7e845e02b10
-
SHA512
cbc2795cf8858e123370c4426c129b6a2f2850fa028fc4ef907c5de0ae1507402b26e48f672ac97f151e8f32c136ea77354f34e543395b12e3699863bed19207
-
SSDEEP
6144:QoUc5bl1Fm5TxD2IQga8schzTsMS84AsMkhBW6YB:QoF5jFmdF27rSSMx4YSBWD
Static task
static1
Behavioral task
behavioral1
Sample
bb45f1bdc9fe6babe14afc4c9cd060c5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
bb45f1bdc9fe6babe14afc4c9cd060c5.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot1620445910:AAF2v81NoINJsu_XXnpGet1YDm-NxnznaIE/sendMessage?chat_id=1063661839
Targets
-
-
Target
bb45f1bdc9fe6babe14afc4c9cd060c5
-
Size
418KB
-
MD5
bb45f1bdc9fe6babe14afc4c9cd060c5
-
SHA1
4ba0d55837412391aa005ee84293c4319308e24c
-
SHA256
601f5c6aca3e36d0b443c83549e7cd373701647db9509d0a8ac0f7e845e02b10
-
SHA512
cbc2795cf8858e123370c4426c129b6a2f2850fa028fc4ef907c5de0ae1507402b26e48f672ac97f151e8f32c136ea77354f34e543395b12e3699863bed19207
-
SSDEEP
6144:QoUc5bl1Fm5TxD2IQga8schzTsMS84AsMkhBW6YB:QoF5jFmdF27rSSMx4YSBWD
Score10/10-
Snake Keylogger payload
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-