General
-
Target
All#att098764576.exe
-
Size
963KB
-
Sample
241002-mpymms1gkl
-
MD5
5341cd0c95c935a73c2d3a3fb31db093
-
SHA1
d2601f228938666674d5e6242d2b96c14ea98e51
-
SHA256
6fabfce57e7c8674b37429eb9afec068608eec31f20c2b085a4b63c7f77873a1
-
SHA512
37a627d82b0a7cb904ad2db75f4ce3ca3e71cfced8a8902569d32c963e042c34945df27cf27052e87cb452719c58220c71830398c12e7b72184d76adcc677f8d
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1iaChCsijnnapIz7E:7JZoQrbTFZY1iaCQJapI8
Static task
static1
Behavioral task
behavioral1
Sample
All#att098764576.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
All#att098764576.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7680649284:AAG1mT6S_D1I5s0plOtxHel1WSk4LngQbVQ/sendMessage?chat_id=6980187819
Targets
-
-
Target
All#att098764576.exe
-
Size
963KB
-
MD5
5341cd0c95c935a73c2d3a3fb31db093
-
SHA1
d2601f228938666674d5e6242d2b96c14ea98e51
-
SHA256
6fabfce57e7c8674b37429eb9afec068608eec31f20c2b085a4b63c7f77873a1
-
SHA512
37a627d82b0a7cb904ad2db75f4ce3ca3e71cfced8a8902569d32c963e042c34945df27cf27052e87cb452719c58220c71830398c12e7b72184d76adcc677f8d
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1iaChCsijnnapIz7E:7JZoQrbTFZY1iaCQJapI8
-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-