General
-
Target
9e0115bc5a747ada6e08054f6db9c93b3c461afde90377b69857461fddf56f34
-
Size
663KB
-
Sample
250220-egynnsxpw5
-
MD5
41097f32b0d23845bcf062247228c3d1
-
SHA1
30910ca60b1cb1a8e978ceaba52f246b615b3691
-
SHA256
9e0115bc5a747ada6e08054f6db9c93b3c461afde90377b69857461fddf56f34
-
SHA512
1e624f010a5220af17d1608a23acf89bc7aedb57a24dc6fb2a204ca1dd00f1c3dc30f29443c49f99532f5b08ec850aa6f9582ddca329dfb5dbc2bb6c81bd28fd
-
SSDEEP
12288:rX3Y58V5YsITuX/iXD78oIvpiHq9D1epzNeAvX4QXdXnLNzVIeCZK:rXlV5YsciQf6piHqfkYiX4QNXnZzHCZK
Static task
static1
Behavioral task
behavioral1
Sample
updated price list.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
updated price list.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7572469755:AAHCBLe3bEv-r8VSlR3NztVSSHz6JBpCC7s/sendMessage?chat_id=7207594974
Targets
-
-
Target
updated price list.exe
-
Size
908KB
-
MD5
ca056a3aebdf8862e08c794f6f0a6f61
-
SHA1
94163a06efc4784bbb04f1fdcf6b0321de3aff0a
-
SHA256
1952bd4cf85d07d155fee0fd9f75b5c5e52af32c20994eb3b248fbd03ffe9fcf
-
SHA512
f244400bc7aff7a6b9a650abc2f0e1d5d9f8232479447cfedd788c6f6605c78a5406241f90e72ac309a65c0944e61a8cd3d00741aab9b8651f5cb1afd814565a
-
SSDEEP
12288:frT5UqCUfsgddZWQbQRqdPCYjkYUaqhqpDoIDpZLFUOvGUTSsFmeCiK2+9Hrs:f2ZwhtxTphtBSsFmnizO
Score10/10-
Snake Keylogger payload
-
Snakekeylogger family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-