General
-
Target
c4a852d85ff37c57045cd79d2e21d3ea1325fed90116ecb513997b945fac9b42
-
Size
482KB
-
Sample
240912-1q1ehswhjl
-
MD5
072c5c9749c79c52f3ab6a37714b0e03
-
SHA1
f9dbd3c98314661c24d83b15363618395121c350
-
SHA256
c4a852d85ff37c57045cd79d2e21d3ea1325fed90116ecb513997b945fac9b42
-
SHA512
48c59fe1d5bc63fcee7f462cf5697cb8d97618896afec50051bbf3acc4b3c5e524896dd5fc47d4825313a54634d6bdbccd3d09238fe6e8eb6a52c055ce89aed0
-
SSDEEP
6144:mQgxqaghBeICoKWK5knPg6S6vO8PtJerB0s4VHr4DDZJCLaROplLaKLWsQLkr0:mBwayjVKWxOotJerBC4DbyJlLa6bLY
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Purchase Order.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot6820629737:AAGJ8tOkoD9jFHkd_L1kG1ntQ1J6zLhFsMc/sendMessage?chat_id=6783205225
Targets
-
-
Target
Purchase Order.exe
-
Size
1.7MB
-
MD5
1967f948fc281d1217739c9aa5b05d6b
-
SHA1
c2b30a0a3be5b4671218ec22ba4d58f155a054ca
-
SHA256
452f83faadab38d84bf3593ed94a45779e32dcf6008ee382c41f47531330e7d5
-
SHA512
2991226e8fe34ae1e60426c56d7f0bd91b1f25e7650bd54930484e512d1827ef1e24a9691c3a8e9eca4fc8f719ca4f6b98c9e75f96bb7a9fc082079b4e9accdd
-
SSDEEP
12288:7mOvpE6rn3e3GtugblwJADA4U0JrhdPjaWDy75EYzqR1:KOvGIOW/blwa0E5hZjaWDsqT
-
Snake Keylogger payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-