General
-
Target
24092024_1433_22092024_hsbc swift.zip
-
Size
396KB
-
Sample
240924-rwtdqasekb
-
MD5
e83a52dcca22e4c7951dab3b269a9491
-
SHA1
4b802049e8b3fee25775150025d6201f62be53f3
-
SHA256
f52a62353fd788c56c43230228cbfcc24a0b2cd3cf520ffd9a6f0735ee068096
-
SHA512
0643a1fe27d246a823afed48e3a070629b1c6d020b9ebeefa390fd39c90bc0a7ed57e328fec364428ccbed6f05c4913ccbd7605b7f45c2a408847f8f65b5cd80
-
SSDEEP
12288:2zH41HF7J7obQ3V/Xs7VeXV9qbx9NCPaC2EXRD8XsgxR:2zY11EQFPsBYqtLCPZQXJ
Static task
static1
Behavioral task
behavioral1
Sample
hsbc swift.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
hsbc swift.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7984047337:AAGSaG0nExqxkiCbwnZqDwxijOF59XBFFIM/sendMessage?chat_id=2135869667
Targets
-
-
Target
hsbc swift.exe
-
Size
748KB
-
MD5
84410ac9abd7ec60088e84613377db6c
-
SHA1
d2f4503deb31982ed04c647d3c723a14a5775a1d
-
SHA256
786c92b68ab04326434ed0e5f8958f04150529ce41b77b7926bef112be70133b
-
SHA512
1b1cd312e2747557655d60de32494da8dee0cf3bcd7e1d2429690ef1c564005bdaf41e0b800ea1d1e3750a059bd69f732e5cd4edbb4567ed67a708a306a11607
-
SSDEEP
12288:wvSqYOE5jq1fdE5rV9MX/IF1MzuAjA53aesE1gqd1twx:BNq1i5fMXQ7MzuAU5qedFs
-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-