General
-
Target
6baa5b3c8d1fb27f023a7c750b057725dee45180f9ebb300b7899a4a0488d2b0
-
Size
313KB
-
Sample
240925-rbp6kayglq
-
MD5
3145bdaea4eaff5d87c5aedf53ad984c
-
SHA1
fc47a1be359b633cc21eb6b29783618acb402c51
-
SHA256
6baa5b3c8d1fb27f023a7c750b057725dee45180f9ebb300b7899a4a0488d2b0
-
SHA512
a0e549ae45a49cc3b74edd8a4095f8166c632ad607a1e136a9c25a43ba377bedd9cdc5d6400198ea1b6894ff8dc85d12b9d3d040f14e59d986f84eae07c1bcb6
-
SSDEEP
6144:TaBSx6s0p/7v9oZrbD5J+PqmctK51/ENX4wY7xmCGzmnsmzHh7hDl2:TathRq9J+P5cs//ESdtm/qs6HFRE
Static task
static1
Behavioral task
behavioral1
Sample
cargo details.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cargo details.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7984047337:AAGSaG0nExqxkiCbwnZqDwxijOF59XBFFIM/sendMessage?chat_id=2135869667
Targets
-
-
Target
cargo details.exe
-
Size
519KB
-
MD5
ce69dc28f560bf9b3c582c95209a6e54
-
SHA1
382ff38ef572983eb65f86b3bd590a4a1423e309
-
SHA256
212b67aa7c112af1b53d5d892e787b07b2edbfeecb22fb4d60781ba8f1820b82
-
SHA512
9664b5b5c6a0d493a7909ce5baf00fd51440bd703567022199161a9fd1e5e8ecce6fa5af46f78633acf6fc1f93d8cfc5a62039372995af3e637523931410d2e9
-
SSDEEP
6144:T6ejWxd7pU7vroaXwxT5LSvObOPVaIrQJt/M7RMcwrENXjeUR1n099bw/c3TYy9k:T6skNHbOPeZrEVnhcd38yTVjs
-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-