General
-
Target
8ca3ae0879c2f0a794977ec3a28d26497825dd68ec048d926c597a69d54b53bd
-
Size
17KB
-
Sample
240925-pn6b7svfrk
-
MD5
bed6ef49260684f2f4139f650f715d3b
-
SHA1
7d471b81facc214d60353f2e99af5601e2cc8bc6
-
SHA256
8ca3ae0879c2f0a794977ec3a28d26497825dd68ec048d926c597a69d54b53bd
-
SHA512
d1fe67558e00eb3ea7be12ee82bd1fefbe320c25176c9fa1b4ccf66cb4e28c4dd54752608c8c7e35f25d217c9b29424e0aeced9e3398f009fd488600c95dae4c
-
SSDEEP
384:5wRM3EE3L9CkYubliG0i612IXaGGmNTTdCkG8iY5D4xlEsSEZd39U7K50Ya/3:5w23ZCdu6X2NG16NY5D47bZg7Kejv
Static task
static1
Behavioral task
behavioral1
Sample
25824092416350.scr
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
25824092416350.scr
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7662274889:AAGmLpUAq41adIZH12LVtlSBknhfnx9iQ2g/sendMessage?chat_id=2052461776
Targets
-
-
Target
25824092416350.scr
-
Size
39KB
-
MD5
47efd3b8ab6e976effe36624d98fd0c8
-
SHA1
d920072220b9ec9b2070e5f639ff67c6635841c9
-
SHA256
df9d082b89ca10844909eaa090c003ddd9081b369b0aa37cc4cbd3c6a91545fd
-
SHA512
593839894d56df016179d1b2063ccbf0580e031ac2fa6d02189308a113ce2953a6a7dcd72b0f303519a9f0f16ecbffdad7b140d9884f825167cafbd89c0fb145
-
SSDEEP
768:4NKrCse1JNEGgyFiHWYlhSwNnBzoz9uPowEkdEmkNWK50wZUek:44P0J2FyFIfMuPl2Nd50UUek
-
Snake Keylogger payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-