General
-
Target
7ef09922582a622f7333d2987d63efc14ecc000a51e160b808dd9520c31f771c.exe
-
Size
540KB
-
Sample
240928-bx1w7asdje
-
MD5
676813934849b161d6dfd5062536318f
-
SHA1
de400cd5edbf8cb741691f13c338744842c0f1a2
-
SHA256
7ef09922582a622f7333d2987d63efc14ecc000a51e160b808dd9520c31f771c
-
SHA512
0325329d32778625583254222a014c3d9cee7c132c5ecdb132e3fcb0adc97345f9632ded15b294800666a67648d84470b01a564fb234997320f1e6ddab46706e
-
SSDEEP
6144:+6ej0DdEWMhO7ZiDBqOV2eR05OvP7jXXgC/MVgWJNYRy7nKx9hO+w7wHQ3SZfTUP:+69EWKq6ucPp0VhJvTKviaxoZ
Static task
static1
Behavioral task
behavioral1
Sample
7ef09922582a622f7333d2987d63efc14ecc000a51e160b808dd9520c31f771c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7ef09922582a622f7333d2987d63efc14ecc000a51e160b808dd9520c31f771c.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.emmioglu.com - Port:
587 - Username:
[email protected] - Password:
Kaya2758+
https://api.telegram.org/bot7793181644:AAGZi9EwhHz_7_W-P3o6zCi0LNG3DYUolRk/sendMessage?chat_id=1645099110
Targets
-
-
Target
7ef09922582a622f7333d2987d63efc14ecc000a51e160b808dd9520c31f771c.exe
-
Size
540KB
-
MD5
676813934849b161d6dfd5062536318f
-
SHA1
de400cd5edbf8cb741691f13c338744842c0f1a2
-
SHA256
7ef09922582a622f7333d2987d63efc14ecc000a51e160b808dd9520c31f771c
-
SHA512
0325329d32778625583254222a014c3d9cee7c132c5ecdb132e3fcb0adc97345f9632ded15b294800666a67648d84470b01a564fb234997320f1e6ddab46706e
-
SSDEEP
6144:+6ej0DdEWMhO7ZiDBqOV2eR05OvP7jXXgC/MVgWJNYRy7nKx9hO+w7wHQ3SZfTUP:+69EWKq6ucPp0VhJvTKviaxoZ
-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-