General
-
Target
38e9d0435a80a7c280bb656e83dafab48ab88c447e17f5ad2da89959707e2021.exe
-
Size
540KB
-
Sample
240925-byn9saxbjm
-
MD5
1d080c71b03634f984c19f08b200f0bf
-
SHA1
34abebce3daeea9dc5ee8ca3dd2bd70676b98a08
-
SHA256
38e9d0435a80a7c280bb656e83dafab48ab88c447e17f5ad2da89959707e2021
-
SHA512
83de1aab06806753b808f225b8efc865d31394aa70025b3130b440de6c18bcc592eea604e6d4f10a78503b5d78d9e164a87f05780b405e405df3cc80ee62549f
-
SSDEEP
6144:h6ejH9QgV2uH8HCbSbRLjAguKxmpJUMWVUPyVfxqK8cQCZphtyylXC35zQTv9VEW:h6u9QgVtHeHRiqMW6yVJqcQ8+WTZ
Static task
static1
Behavioral task
behavioral1
Sample
38e9d0435a80a7c280bb656e83dafab48ab88c447e17f5ad2da89959707e2021.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
38e9d0435a80a7c280bb656e83dafab48ab88c447e17f5ad2da89959707e2021.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.emmioglu.com - Port:
587 - Username:
[email protected] - Password:
Kaya2758+
https://api.telegram.org/bot7824402550:AAF0zLhO0leZXvzGs8C_m31pnXq-KGoVm_I/sendMessage?chat_id=6651428318
Targets
-
-
Target
38e9d0435a80a7c280bb656e83dafab48ab88c447e17f5ad2da89959707e2021.exe
-
Size
540KB
-
MD5
1d080c71b03634f984c19f08b200f0bf
-
SHA1
34abebce3daeea9dc5ee8ca3dd2bd70676b98a08
-
SHA256
38e9d0435a80a7c280bb656e83dafab48ab88c447e17f5ad2da89959707e2021
-
SHA512
83de1aab06806753b808f225b8efc865d31394aa70025b3130b440de6c18bcc592eea604e6d4f10a78503b5d78d9e164a87f05780b405e405df3cc80ee62549f
-
SSDEEP
6144:h6ejH9QgV2uH8HCbSbRLjAguKxmpJUMWVUPyVfxqK8cQCZphtyylXC35zQTv9VEW:h6u9QgVtHeHRiqMW6yVJqcQ8+WTZ
-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-