General
-
Target
c895f5dae03d1e6030775e0161975b14
-
Size
248KB
-
Sample
240314-pcdg2sdh72
-
MD5
c895f5dae03d1e6030775e0161975b14
-
SHA1
18c28bce01ba6d6e3fce7bdf568baf302dac77df
-
SHA256
db2ecbc435d932b7947857e4f9108ffe48c7a5af8ad9a34836c9d6cd96193ed0
-
SHA512
5ebc550b39310edd80b58ceb155863044c34c569d9c223bc587aed150bc26d65ae7dfc9ce219ae4948fa5efb38abcb525702991e99f0690d4a01522ed55f371d
-
SSDEEP
6144:AJHzPHIzMi9nhZpsdaisFaRdL5svoPYypqvj3jt27wl3Y:KTRdNo1ygj3s
Static task
static1
Behavioral task
behavioral1
Sample
c895f5dae03d1e6030775e0161975b14.js
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c895f5dae03d1e6030775e0161975b14.js
Resource
win10v2004-20240226-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot1923344551:AAGJ9MeV4yHipzEdvvxVuepm8PFUNaCZez4/sendMessage?chat_id=1208289397
Targets
-
-
Target
c895f5dae03d1e6030775e0161975b14
-
Size
248KB
-
MD5
c895f5dae03d1e6030775e0161975b14
-
SHA1
18c28bce01ba6d6e3fce7bdf568baf302dac77df
-
SHA256
db2ecbc435d932b7947857e4f9108ffe48c7a5af8ad9a34836c9d6cd96193ed0
-
SHA512
5ebc550b39310edd80b58ceb155863044c34c569d9c223bc587aed150bc26d65ae7dfc9ce219ae4948fa5efb38abcb525702991e99f0690d4a01522ed55f371d
-
SSDEEP
6144:AJHzPHIzMi9nhZpsdaisFaRdL5svoPYypqvj3jt27wl3Y:KTRdNo1ygj3s
-
Snake Keylogger payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-