General
-
Target
1710f0177e4e1941322b7d2de4169458b050fefcbd31533f610248e0fec0d10b
-
Size
596KB
-
Sample
240911-xxakwsybpa
-
MD5
3be5240cc6bfc1b86c76cd100cb7b3a3
-
SHA1
24daeb6daa928d218c608f6f8526ece0986f93a5
-
SHA256
1710f0177e4e1941322b7d2de4169458b050fefcbd31533f610248e0fec0d10b
-
SHA512
33c067a0dc7e62a63dca7832ddfa3cfedfd658a80c9c2785fd0f0ea6c9058b3b5ad64b368805e0f54cb895df5ce345511e7365b5ddd06e6828e7c42a63d2987f
-
SSDEEP
12288:dA1EnX4PjNbtilhqZbI8WbLvXEY25gkKu39dNA9:dGEX4bzchqZUznV2fKW
Static task
static1
Behavioral task
behavioral1
Sample
1710f0177e4e1941322b7d2de4169458b050fefcbd31533f610248e0fec0d10b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1710f0177e4e1941322b7d2de4169458b050fefcbd31533f610248e0fec0d10b.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7323804265:AAGOrHmilwRNOOZbuVQa6WTtwu__mfCEENE/sendMessage?chat_id=7365454061
Targets
-
-
Target
1710f0177e4e1941322b7d2de4169458b050fefcbd31533f610248e0fec0d10b
-
Size
596KB
-
MD5
3be5240cc6bfc1b86c76cd100cb7b3a3
-
SHA1
24daeb6daa928d218c608f6f8526ece0986f93a5
-
SHA256
1710f0177e4e1941322b7d2de4169458b050fefcbd31533f610248e0fec0d10b
-
SHA512
33c067a0dc7e62a63dca7832ddfa3cfedfd658a80c9c2785fd0f0ea6c9058b3b5ad64b368805e0f54cb895df5ce345511e7365b5ddd06e6828e7c42a63d2987f
-
SSDEEP
12288:dA1EnX4PjNbtilhqZbI8WbLvXEY25gkKu39dNA9:dGEX4bzchqZUznV2fKW
-
Snake Keylogger payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-