General
-
Target
5a92d770d34718ab6624c95d586269cb9d144803cb0f94ea91b78344360eb5cf.exe
-
Size
1.4MB
-
Sample
240705-vg5pzsvbje
-
MD5
1a3037dced4fbdc13c75a4a4a34183a5
-
SHA1
7e1572f43015ae80ee15354bce184ac0f75e6e67
-
SHA256
5a92d770d34718ab6624c95d586269cb9d144803cb0f94ea91b78344360eb5cf
-
SHA512
5ba8603f9a2e8606620430198002fb7e91491db0bc5dfad354ccc70024c8fcfd631ba0e34af2615bb569e6946705811253be136b5b1f6970567b579f78912ab2
-
SSDEEP
12288:a/ysGty1fTXeVCs9mLzGoPbAU6TNuUjFwCbxvVaMOo+961u:a/ysGtEfTuVDmPZbwTN1jPlvVaP5I1u
Static task
static1
Behavioral task
behavioral1
Sample
5a92d770d34718ab6624c95d586269cb9d144803cb0f94ea91b78344360eb5cf.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5a92d770d34718ab6624c95d586269cb9d144803cb0f94ea91b78344360eb5cf.exe
Resource
win10v2004-20240704-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7388475942:AAE6mkO0w6qR_NK1NnfOAG-t5uHzWLuoUXo/sendMessage?chat_id=5259132764
Targets
-
-
Target
5a92d770d34718ab6624c95d586269cb9d144803cb0f94ea91b78344360eb5cf.exe
-
Size
1.4MB
-
MD5
1a3037dced4fbdc13c75a4a4a34183a5
-
SHA1
7e1572f43015ae80ee15354bce184ac0f75e6e67
-
SHA256
5a92d770d34718ab6624c95d586269cb9d144803cb0f94ea91b78344360eb5cf
-
SHA512
5ba8603f9a2e8606620430198002fb7e91491db0bc5dfad354ccc70024c8fcfd631ba0e34af2615bb569e6946705811253be136b5b1f6970567b579f78912ab2
-
SSDEEP
12288:a/ysGty1fTXeVCs9mLzGoPbAU6TNuUjFwCbxvVaMOo+961u:a/ysGtEfTuVDmPZbwTN1jPlvVaP5I1u
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-