General
-
Target
Max.exe
-
Size
772KB
-
Sample
231225-rx8vssafdm
-
MD5
770f963943fae86ad2fb95533defae2d
-
SHA1
efadeaa28fe3c30e1224d41836b40666f9f5cd38
-
SHA256
fd3215fd4bcb33f2149cd4bed63011c2b992b5a008cdd289559031741e8a3089
-
SHA512
ae6480f80555dd6ed6dd8780d9faf4b0b3ba21a8b3f0ff50c73a5d38fa930ddc34e09ee0aaeb208c08d334b7404ab854478e1a39f929a496835e21de50a052c5
-
SSDEEP
12288:ZJpHCmbiNIwP7BpD1tM2MH6YZLuKw3WDJV733EgpAbSVv8Ipch:VCFPNpD1tM2MTZLEwV
Static task
static1
Behavioral task
behavioral1
Sample
Max.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Max.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
Max.exe
-
Size
772KB
-
MD5
770f963943fae86ad2fb95533defae2d
-
SHA1
efadeaa28fe3c30e1224d41836b40666f9f5cd38
-
SHA256
fd3215fd4bcb33f2149cd4bed63011c2b992b5a008cdd289559031741e8a3089
-
SHA512
ae6480f80555dd6ed6dd8780d9faf4b0b3ba21a8b3f0ff50c73a5d38fa930ddc34e09ee0aaeb208c08d334b7404ab854478e1a39f929a496835e21de50a052c5
-
SSDEEP
12288:ZJpHCmbiNIwP7BpD1tM2MH6YZLuKw3WDJV733EgpAbSVv8Ipch:VCFPNpD1tM2MTZLEwV
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-