General
-
Target
dcb42b8ad4e7cc40fe12cfef0f5b97fba6073716a6315784ed6dd8847a51e86d.exe
-
Size
909KB
-
Sample
250220-etzfqswncz
-
MD5
48303a0f6cf86a64328acc545192bff0
-
SHA1
2c9973e30e9697c5c8b6a91ecb3fbc8b05c3b455
-
SHA256
dcb42b8ad4e7cc40fe12cfef0f5b97fba6073716a6315784ed6dd8847a51e86d
-
SHA512
f54afc180d0d1bf6ce4ddaa8ea04a1c2281390a8bc102b2b5e52d6bed2083932af1e0862a7d498695cde64a939d5704d2e48766c4b72fab76c8321cd8ac36891
-
SSDEEP
12288:m3ks0DMw9q5M3FYOc+s7LbcwH8YiSFDw5:m3ksxw9rYO6Pcwcaw
Static task
static1
Behavioral task
behavioral1
Sample
dcb42b8ad4e7cc40fe12cfef0f5b97fba6073716a6315784ed6dd8847a51e86d.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
dcb42b8ad4e7cc40fe12cfef0f5b97fba6073716a6315784ed6dd8847a51e86d.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7572469755:AAHCBLe3bEv-r8VSlR3NztVSSHz6JBpCC7s/sendMessage?chat_id=7207594974
Targets
-
-
Target
dcb42b8ad4e7cc40fe12cfef0f5b97fba6073716a6315784ed6dd8847a51e86d.exe
-
Size
909KB
-
MD5
48303a0f6cf86a64328acc545192bff0
-
SHA1
2c9973e30e9697c5c8b6a91ecb3fbc8b05c3b455
-
SHA256
dcb42b8ad4e7cc40fe12cfef0f5b97fba6073716a6315784ed6dd8847a51e86d
-
SHA512
f54afc180d0d1bf6ce4ddaa8ea04a1c2281390a8bc102b2b5e52d6bed2083932af1e0862a7d498695cde64a939d5704d2e48766c4b72fab76c8321cd8ac36891
-
SSDEEP
12288:m3ks0DMw9q5M3FYOc+s7LbcwH8YiSFDw5:m3ksxw9rYO6Pcwcaw
Score10/10-
Snake Keylogger payload
-
Snakekeylogger family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-