General
-
Target
21defeecddcd60f6dd2fb4efc93503f1ff759cf81dc3429d8cff40f9977b3d6c.exe
-
Size
670KB
-
Sample
240722-svzd1svand
-
MD5
f8be25a014b6d2c4ef534e685ec9a327
-
SHA1
391a5b2f1a5d669e9c0c0377dd5c0f0063123c6f
-
SHA256
21defeecddcd60f6dd2fb4efc93503f1ff759cf81dc3429d8cff40f9977b3d6c
-
SHA512
d9a33afb966eb9ad60a764b609e3164ee81bc84f1fadcb40a3bcd7b1f1c745dfc306e400b5ce5fd3f5ae63515872217478d50add287bd54c7e7eaba581567050
-
SSDEEP
12288:xYV6MorX7qzuC3QHO9FQVHPF51jgcEjBnmK0Sw06ogk2feu2yQcKr5ROdY:GBXu9HGaVHGrwiOfeuhQHOm
Behavioral task
behavioral1
Sample
21defeecddcd60f6dd2fb4efc93503f1ff759cf81dc3429d8cff40f9977b3d6c.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
21defeecddcd60f6dd2fb4efc93503f1ff759cf81dc3429d8cff40f9977b3d6c.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7479517689:AAFZXzeEulm16gwWbLqx5RMoTeKEfX7e5jQ/sendMessage?chat_id=7071568333
Targets
-
-
Target
21defeecddcd60f6dd2fb4efc93503f1ff759cf81dc3429d8cff40f9977b3d6c.exe
-
Size
670KB
-
MD5
f8be25a014b6d2c4ef534e685ec9a327
-
SHA1
391a5b2f1a5d669e9c0c0377dd5c0f0063123c6f
-
SHA256
21defeecddcd60f6dd2fb4efc93503f1ff759cf81dc3429d8cff40f9977b3d6c
-
SHA512
d9a33afb966eb9ad60a764b609e3164ee81bc84f1fadcb40a3bcd7b1f1c745dfc306e400b5ce5fd3f5ae63515872217478d50add287bd54c7e7eaba581567050
-
SSDEEP
12288:xYV6MorX7qzuC3QHO9FQVHPF51jgcEjBnmK0Sw06ogk2feu2yQcKr5ROdY:GBXu9HGaVHGrwiOfeuhQHOm
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-