General
-
Target
64157d14bc770c59f8cfffa73f7dec64d2b2a1568329712681633388cf682823.r00
-
Size
633KB
-
Sample
250221-dsxeba1rhn
-
MD5
16064f256cae97624c06245b53ffefb8
-
SHA1
eb82d4b36c13f98aff67ea626a286f2821cde63a
-
SHA256
64157d14bc770c59f8cfffa73f7dec64d2b2a1568329712681633388cf682823
-
SHA512
4d5dfd7f77b9b67b191f967f79c6c00f2d5b2421cc7347b220b18574ccaddbf50bdb634c3bd368be826886c04a5bcfd1fbc2613b7fd700a00d1138833ef95fa7
-
SSDEEP
12288:YJN8lG7s8RmXpXuqbSmj5iNCsOg5uaptjLst/QCvNEzg9GkiMQQY3jCG0cC:LQ7sZu4oNCy/p0NEM9LQQsjCGnC
Static task
static1
Behavioral task
behavioral1
Sample
lgh5walrVUMJyT7.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
lgh5walrVUMJyT7.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7791603510:AAFQYjUt2v3SAld_qBIl7vQWHq4eSD9hepU/sendMessage?chat_id=6306771742
Targets
-
-
Target
lgh5walrVUMJyT7.exe
-
Size
802KB
-
MD5
420361f15c6b5f83e2116a38dfc30be2
-
SHA1
667f02f4d72f15699a3438a48fe1a04b6d739332
-
SHA256
ca24c73a0f1820042d015e2d96c97c08a37cda6cda766e609f9e33970f269fee
-
SHA512
fe7159d8e78def63fd2dfc769277fd85ed6b65d21e2aada052304630af3a9746d007c924b03ce370e016b77ac61c465861b9e598acc5f08cb5f9dfd592f64b97
-
SSDEEP
12288:5OBUrzYDpGDWN74lZK6Jp61c9ZUBYJxnPN9/vs8:XXMpGy7GZK6JRZUGJhF9/
Score10/10-
Snake Keylogger payload
-
Snakekeylogger family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-