General
-
Target
malw.jpg.pif
-
Size
627KB
-
Sample
240906-rg6qha1eng
-
MD5
618dab9ba55692e86e4557d561417628
-
SHA1
08ba7ba92df636e936a0f138bc735dfc56ba4722
-
SHA256
43a1e3cca46c0876a7082c04aa7b0b0174aff22a9387301229eacbb120334fcf
-
SHA512
1e91ebe54fd7809a47a438453be506c47f681bb174c1eb8ad0c3aac611c1788d716ffbcab8ace9bb56d6215a5edf3544a80740f9fc1d20fe5f617cae3ace6ada
-
SSDEEP
12288:FH21UoIG5MPU8swE31D2shk8giOInK12jpXB1juSGf4HrS4CG7qFHEDg:4Uoby8P38shk8PFpXBY14HGZG78Sg
Static task
static1
Behavioral task
behavioral1
Sample
malw.jpg.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
malw.jpg.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7323804265:AAGOrHmilwRNOOZbuVQa6WTtwu__mfCEENE/sendMessage?chat_id=7365454061
Targets
-
-
Target
malw.jpg.pif
-
Size
627KB
-
MD5
618dab9ba55692e86e4557d561417628
-
SHA1
08ba7ba92df636e936a0f138bc735dfc56ba4722
-
SHA256
43a1e3cca46c0876a7082c04aa7b0b0174aff22a9387301229eacbb120334fcf
-
SHA512
1e91ebe54fd7809a47a438453be506c47f681bb174c1eb8ad0c3aac611c1788d716ffbcab8ace9bb56d6215a5edf3544a80740f9fc1d20fe5f617cae3ace6ada
-
SSDEEP
12288:FH21UoIG5MPU8swE31D2shk8giOInK12jpXB1juSGf4HrS4CG7qFHEDg:4Uoby8P38shk8PFpXBY14HGZG78Sg
-
Snake Keylogger payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-