General
-
Target
f696fe58ff5ed8b84610d32dbfd0c9fb74ab01e8884ef1df45dc58ea43274ed3
-
Size
941KB
-
Sample
240920-pye8rsxcrr
-
MD5
61f9e6be7cae28b88ea8481acbe0c2c4
-
SHA1
79f3eae9574c2a5e31483748ed4fb88d7ecd2d6f
-
SHA256
f696fe58ff5ed8b84610d32dbfd0c9fb74ab01e8884ef1df45dc58ea43274ed3
-
SHA512
fa0c63dd8c837f2368a3c858edb97b7f1208fe18cec09e1cb24d0bf4f0e073d8e30bc50d22b279ede734394b661eda0e7a16144a1957b282fffccf3007470378
-
SSDEEP
24576:CLPI+JIfpe0ba/gDI7/dccQ8hxQuP6qXxOt0khg0lPDQMAI:CEnRK/0Iy0XQRqXxREvhDQQ
Static task
static1
Behavioral task
behavioral1
Sample
f696fe58ff5ed8b84610d32dbfd0c9fb74ab01e8884ef1df45dc58ea43274ed3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f696fe58ff5ed8b84610d32dbfd0c9fb74ab01e8884ef1df45dc58ea43274ed3.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7327372938:AAHFwuC3knQ9jY-1T98yh8owXZiixS_neU0/sendMessage?chat_id=6951521546
Targets
-
-
Target
f696fe58ff5ed8b84610d32dbfd0c9fb74ab01e8884ef1df45dc58ea43274ed3
-
Size
941KB
-
MD5
61f9e6be7cae28b88ea8481acbe0c2c4
-
SHA1
79f3eae9574c2a5e31483748ed4fb88d7ecd2d6f
-
SHA256
f696fe58ff5ed8b84610d32dbfd0c9fb74ab01e8884ef1df45dc58ea43274ed3
-
SHA512
fa0c63dd8c837f2368a3c858edb97b7f1208fe18cec09e1cb24d0bf4f0e073d8e30bc50d22b279ede734394b661eda0e7a16144a1957b282fffccf3007470378
-
SSDEEP
24576:CLPI+JIfpe0ba/gDI7/dccQ8hxQuP6qXxOt0khg0lPDQMAI:CEnRK/0Iy0XQRqXxREvhDQQ
-
Snake Keylogger payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-