General
-
Target
e3943672b62d0091f373faef1565c6bc328b9fa97ce1a3f6e76b06596ad38fc4.exe
-
Size
2.0MB
-
Sample
241010-cvx8ysverc
-
MD5
f107093ca8c59b80610b4169011e191b
-
SHA1
92c71dd5a306556b5e114bc044dce66672bf5dbd
-
SHA256
e3943672b62d0091f373faef1565c6bc328b9fa97ce1a3f6e76b06596ad38fc4
-
SHA512
4474bdba442d64fb680b36cbfd8c75c66287fb2643d0f869ef087799d5388b16d7422bf4f9049258bb325678966763c038dae69268172dcde03fcf21701ef651
-
SSDEEP
12288:m6G6SmMovrikZH/IOxg5p6Z0PuHufm4to544VmxSfXwPzWwPW:V/MoD5VOBnLW
Static task
static1
Behavioral task
behavioral1
Sample
e3943672b62d0091f373faef1565c6bc328b9fa97ce1a3f6e76b06596ad38fc4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e3943672b62d0091f373faef1565c6bc328b9fa97ce1a3f6e76b06596ad38fc4.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5959992477:AAHE-7vhpGmcidn94EXH2Dz0foqgJdGDb1E/sendMessage?chat_id=6070433873
Targets
-
-
Target
e3943672b62d0091f373faef1565c6bc328b9fa97ce1a3f6e76b06596ad38fc4.exe
-
Size
2.0MB
-
MD5
f107093ca8c59b80610b4169011e191b
-
SHA1
92c71dd5a306556b5e114bc044dce66672bf5dbd
-
SHA256
e3943672b62d0091f373faef1565c6bc328b9fa97ce1a3f6e76b06596ad38fc4
-
SHA512
4474bdba442d64fb680b36cbfd8c75c66287fb2643d0f869ef087799d5388b16d7422bf4f9049258bb325678966763c038dae69268172dcde03fcf21701ef651
-
SSDEEP
12288:m6G6SmMovrikZH/IOxg5p6Z0PuHufm4to544VmxSfXwPzWwPW:V/MoD5VOBnLW
Score10/10-
Snake Keylogger payload
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-