General
-
Target
8038.exe
-
Size
938KB
-
Sample
241004-krlpravdkr
-
MD5
474fe2de28e815dcd525a3189150c7d8
-
SHA1
9d854ffaaac15bf2d135feb419a1de6420ce5f67
-
SHA256
1d80a3621d8d936a6a5d902ff6158705b950346031b233274b9707a6e430df3a
-
SHA512
606eae85305cd7a2ec6c577afe7af6a852400a89c133912c6708ec4a16440ef191f2fde657ae893ef927104c847d4cb8bf037441b5012e52be5ee62089f43cce
-
SSDEEP
24576:ffmMv6Ckr7Mny5QLQdw3Zi4OfCvltztQgI:f3v+7/5QLhJAfCvl8v
Static task
static1
Behavioral task
behavioral1
Sample
8038.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8038.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7887381131:AAH4jHJ7Kc0dolQ_x2jW8rTr7XHsdKKLTaM/sendMessage?chat_id=6557702940
Targets
-
-
Target
8038.exe
-
Size
938KB
-
MD5
474fe2de28e815dcd525a3189150c7d8
-
SHA1
9d854ffaaac15bf2d135feb419a1de6420ce5f67
-
SHA256
1d80a3621d8d936a6a5d902ff6158705b950346031b233274b9707a6e430df3a
-
SHA512
606eae85305cd7a2ec6c577afe7af6a852400a89c133912c6708ec4a16440ef191f2fde657ae893ef927104c847d4cb8bf037441b5012e52be5ee62089f43cce
-
SSDEEP
24576:ffmMv6Ckr7Mny5QLQdw3Zi4OfCvltztQgI:f3v+7/5QLhJAfCvl8v
-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-