General
-
Target
212b67aa7c112af1b53d5d892e787b07b2edbfeecb22fb4d60781ba8f1820b82.exe
-
Size
519KB
-
Sample
240925-r4a74svajc
-
MD5
ce69dc28f560bf9b3c582c95209a6e54
-
SHA1
382ff38ef572983eb65f86b3bd590a4a1423e309
-
SHA256
212b67aa7c112af1b53d5d892e787b07b2edbfeecb22fb4d60781ba8f1820b82
-
SHA512
9664b5b5c6a0d493a7909ce5baf00fd51440bd703567022199161a9fd1e5e8ecce6fa5af46f78633acf6fc1f93d8cfc5a62039372995af3e637523931410d2e9
-
SSDEEP
6144:T6ejWxd7pU7vroaXwxT5LSvObOPVaIrQJt/M7RMcwrENXjeUR1n099bw/c3TYy9k:T6skNHbOPeZrEVnhcd38yTVjs
Static task
static1
Behavioral task
behavioral1
Sample
212b67aa7c112af1b53d5d892e787b07b2edbfeecb22fb4d60781ba8f1820b82.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
212b67aa7c112af1b53d5d892e787b07b2edbfeecb22fb4d60781ba8f1820b82.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7984047337:AAGSaG0nExqxkiCbwnZqDwxijOF59XBFFIM/sendMessage?chat_id=2135869667
Targets
-
-
Target
212b67aa7c112af1b53d5d892e787b07b2edbfeecb22fb4d60781ba8f1820b82.exe
-
Size
519KB
-
MD5
ce69dc28f560bf9b3c582c95209a6e54
-
SHA1
382ff38ef572983eb65f86b3bd590a4a1423e309
-
SHA256
212b67aa7c112af1b53d5d892e787b07b2edbfeecb22fb4d60781ba8f1820b82
-
SHA512
9664b5b5c6a0d493a7909ce5baf00fd51440bd703567022199161a9fd1e5e8ecce6fa5af46f78633acf6fc1f93d8cfc5a62039372995af3e637523931410d2e9
-
SSDEEP
6144:T6ejWxd7pU7vroaXwxT5LSvObOPVaIrQJt/M7RMcwrENXjeUR1n099bw/c3TYy9k:T6skNHbOPeZrEVnhcd38yTVjs
-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-