General
-
Target
11102024_0205_09102024_FACTURAS PROFORMA.rar
-
Size
731KB
-
Sample
241011-chs4gazcnd
-
MD5
b4ab2d8e5fb974222276c5979d381714
-
SHA1
c26b5951c621ac76790ef9cc680082d12f805635
-
SHA256
fd65e8f874d975885318088bc7b522e8057754d544290db012fa7ca33662db89
-
SHA512
15029e7a1e1e0316349abc89865b7cfda9e9bd5c7e7548fcc77599ec352565ca6e625a2dd73a59af279a2e65659cc54029c8ff9013ba9fe7f1541de3453eec64
-
SSDEEP
12288:8UPVfPEAk0bBilG1do54ipVa2x+Wr19B9CCrFgju8UVIP8uBzj2zt6KbFO:fXk0FilGDo54iOY+Wpb9i2Ezj25tO
Static task
static1
Behavioral task
behavioral1
Sample
FACTURAS PROFORMA.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
FACTURAS PROFORMA.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7952998151:AAFh98iY7kaOlHAR0qftD3ZcqGbQm0TXbBY/sendMessage?chat_id=5692813672
Targets
-
-
Target
FACTURAS PROFORMA.exe
-
Size
1.1MB
-
MD5
43723b5f3929b4f27f20a1bef23d7382
-
SHA1
97b115fafd165021ef7f2c8476a79c9843200f49
-
SHA256
19ced3f729d628d8b5b44c4f5c508349ece2cf5a730ea8ea893f931b5325b336
-
SHA512
c68e6edb9902127c03d93c524a62785d4f05ddc91bbba111f47a1f973a262100eb85675a7c6b56b9478256c41e03f75d5f3c2f9c2d4d9b724cb4a4e4f2c141a5
-
SSDEEP
24576:ffmMv6Ckr7Mny5QLUgmGiA48NoTgLTTXZ92uufOCRi:f3v+7/5QLU5GiA4fkzXZguuTRi
-
Snake Keylogger payload
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-