General
-
Target
e080f9706527c90237f613bdb674112e2b5a6e2e14138498dc31397661fb7efb.exe
-
Size
1.1MB
-
Sample
241008-cwz4yathnr
-
MD5
e82db51cc781d6b53a1c430334237d8b
-
SHA1
8631d3b51ad60a2172686bdca75230db1d4d980b
-
SHA256
e080f9706527c90237f613bdb674112e2b5a6e2e14138498dc31397661fb7efb
-
SHA512
b191c4a30b68cb840f28e043c9237c0f536703096f2021716480adff82b8e53c0342d95668e6d5f3e766801cf03fc39277af4916a7f17e906de5b806e7996dcf
-
SSDEEP
24576:ffmMv6Ckr7Mny5QLnkIPciTUDAfsPKSqS+7:f3v+7/5QLbPBXx97
Static task
static1
Behavioral task
behavioral1
Sample
e080f9706527c90237f613bdb674112e2b5a6e2e14138498dc31397661fb7efb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e080f9706527c90237f613bdb674112e2b5a6e2e14138498dc31397661fb7efb.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot6758088233:AAFj4Y2Zn6GDp8qtYIlHf1VVN4k4QQ5uaio/sendMessage?chat_id=5117030493
Targets
-
-
Target
e080f9706527c90237f613bdb674112e2b5a6e2e14138498dc31397661fb7efb.exe
-
Size
1.1MB
-
MD5
e82db51cc781d6b53a1c430334237d8b
-
SHA1
8631d3b51ad60a2172686bdca75230db1d4d980b
-
SHA256
e080f9706527c90237f613bdb674112e2b5a6e2e14138498dc31397661fb7efb
-
SHA512
b191c4a30b68cb840f28e043c9237c0f536703096f2021716480adff82b8e53c0342d95668e6d5f3e766801cf03fc39277af4916a7f17e906de5b806e7996dcf
-
SSDEEP
24576:ffmMv6Ckr7Mny5QLnkIPciTUDAfsPKSqS+7:f3v+7/5QLbPBXx97
-
Snake Keylogger payload
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-