General
-
Target
4bc758d8221e17d247ccbb043a73822e034cd67c16564154b1ccf41087d7b869
-
Size
352KB
-
Sample
240417-rcy5vsba24
-
MD5
9ced838bc2b49986a97f5abe096a4802
-
SHA1
5e9d57e1e5bcb36bcb6822a259be85421dba0795
-
SHA256
4bc758d8221e17d247ccbb043a73822e034cd67c16564154b1ccf41087d7b869
-
SHA512
54a72e271736adca386d289aacf1fbbe260d8a64a1fb2b02e22023f851d5e350cb8d158c45af42c5bd25d43893010bf6138f237b81736056f4c63dcea6fa29b0
-
SSDEEP
6144:tVx2OvhF02SpHlDc9k2RIns3jf0ONNzDu0tFCN+YbZzeZQ39iKCoJlj:jxv05Jcsnojf5M6lYl6ZQ3PH/j
Static task
static1
Behavioral task
behavioral1
Sample
88137ef5ca05130558e846da3d480008f2e5488a7543872195f64daa5a04b365.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
88137ef5ca05130558e846da3d480008f2e5488a7543872195f64daa5a04b365.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
snakekeylogger
https://scratchdreams.tk
Targets
-
-
Target
88137ef5ca05130558e846da3d480008f2e5488a7543872195f64daa5a04b365.exe
-
Size
459KB
-
MD5
8ad01c64b357780c078e44780c322600
-
SHA1
a016f5f6ff8a89557e34b5e5173dfc8a9a50b6ab
-
SHA256
88137ef5ca05130558e846da3d480008f2e5488a7543872195f64daa5a04b365
-
SHA512
e1d0a7c2749b1f06fa22c8f0a3b134f8220b9c4898e8af9d7c1ee33567f07d245f606ddb74e02afa71c7f4076051afb1c99f72f5d47da2efa1ed5534a1de825d
-
SSDEEP
6144:q+hiQ1o1emq43RaLJM5hp8Sp1YX7RdE66hYM30mztCiLAzvmBsOuRLX3+0Wtz6t0:74ZqGhF7uidhYM7COQvmBsOeetyAQF
Score10/10-
Snake Keylogger payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-