General
-
Target
F900 - VSL DESC.exe
-
Size
525KB
-
Sample
240103-pmq6wschgr
-
MD5
3138b63ef0d439ebc2e631452307c089
-
SHA1
176b629248c486842e03a897192dbc6043a57fe5
-
SHA256
1af4b1e67dee34e1ce541150c83e1be4f75766d47ecebf4b476cb08aa04fa837
-
SHA512
f83dcb33c5777d9efc9100705761786a7d1dada83331866a95fbd3042357f7d7b87aa36cc1dc7fcbe8e9af4118bdd1cd5e2734366c1cc7d1c85b95be8c6767c0
-
SSDEEP
12288:/ytros3iYd2DGhjsTJWJHJ+HgyJsMgqFyaHs:/WosNDdRJHcHZJt
Static task
static1
Behavioral task
behavioral1
Sample
F900 - VSL DESC.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
F900 - VSL DESC.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
F900 - VSL DESC.exe
-
Size
525KB
-
MD5
3138b63ef0d439ebc2e631452307c089
-
SHA1
176b629248c486842e03a897192dbc6043a57fe5
-
SHA256
1af4b1e67dee34e1ce541150c83e1be4f75766d47ecebf4b476cb08aa04fa837
-
SHA512
f83dcb33c5777d9efc9100705761786a7d1dada83331866a95fbd3042357f7d7b87aa36cc1dc7fcbe8e9af4118bdd1cd5e2734366c1cc7d1c85b95be8c6767c0
-
SSDEEP
12288:/ytros3iYd2DGhjsTJWJHJ+HgyJsMgqFyaHs:/WosNDdRJHcHZJt
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-