General
-
Target
58208 Teklif.exe
-
Size
826KB
-
Sample
240408-mztrfafd97
-
MD5
dc59e080bc0be8cee52ec9e79ccc7e82
-
SHA1
22d8e9aab959c584acc896bfeed170ffa672f1cb
-
SHA256
95e4dd6cc5a341f4440a113e0a832175aa2f5baafd9c7483255a18088e1c2764
-
SHA512
7b836760ab575de13b95878a075ff8998e57433d0a7f5b2efb2bc4e3d7c4459e06af9cd71ca19f36913afde5c2b265667658542d892a61ea7f5b17f19d2484e0
-
SSDEEP
12288:6rLz6X60UHRoVNDWX4gpBRkZf0E5Vav8V7DcRIqlrTwimh0ndFJkTtlXkR:r67HRi4XLy90E5IUFgIqlrtnzQPC
Static task
static1
Behavioral task
behavioral1
Sample
58208 Teklif.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
58208 Teklif.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
snakekeylogger
https://scratchdreams.tk
Targets
-
-
Target
58208 Teklif.exe
-
Size
826KB
-
MD5
dc59e080bc0be8cee52ec9e79ccc7e82
-
SHA1
22d8e9aab959c584acc896bfeed170ffa672f1cb
-
SHA256
95e4dd6cc5a341f4440a113e0a832175aa2f5baafd9c7483255a18088e1c2764
-
SHA512
7b836760ab575de13b95878a075ff8998e57433d0a7f5b2efb2bc4e3d7c4459e06af9cd71ca19f36913afde5c2b265667658542d892a61ea7f5b17f19d2484e0
-
SSDEEP
12288:6rLz6X60UHRoVNDWX4gpBRkZf0E5Vav8V7DcRIqlrTwimh0ndFJkTtlXkR:r67HRi4XLy90E5IUFgIqlrtnzQPC
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-