General
-
Target
malw.exe
-
Size
954KB
-
Sample
240925-h9s6fawama
-
MD5
c8379e68ab86d95f8f5325e95343194c
-
SHA1
72aaaf274c5b13c8b05cbf10db52580c9201811a
-
SHA256
51db24ea281866cd0b7354b927198f4df35020df5a84dd66d64dc524421773ae
-
SHA512
cc48de82e88e50d2e4b2d420d3d242cb46ce4e9e355e7d662bb3f2bd7a66bcdebb0c57ec9d5c3121a9297f4ea3d1bbed46a35276376b773cbcc9fb4fae7edb7b
-
SSDEEP
24576:iqQvaIDEiGUbwU+avF0NIOB+WrqYwt8xc5yhW1ylAcCpW:RIBG2+AF6Rq19I7
Static task
static1
Behavioral task
behavioral1
Sample
malw.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
malw.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7474456639:AAF2j-ISHiGNoePD1xhl9WRvvV-5BBOVIcQ/sendMessage?chat_id=7365454061
Targets
-
-
Target
malw.exe
-
Size
954KB
-
MD5
c8379e68ab86d95f8f5325e95343194c
-
SHA1
72aaaf274c5b13c8b05cbf10db52580c9201811a
-
SHA256
51db24ea281866cd0b7354b927198f4df35020df5a84dd66d64dc524421773ae
-
SHA512
cc48de82e88e50d2e4b2d420d3d242cb46ce4e9e355e7d662bb3f2bd7a66bcdebb0c57ec9d5c3121a9297f4ea3d1bbed46a35276376b773cbcc9fb4fae7edb7b
-
SSDEEP
24576:iqQvaIDEiGUbwU+avF0NIOB+WrqYwt8xc5yhW1ylAcCpW:RIBG2+AF6Rq19I7
-
Snake Keylogger payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-