General
-
Target
b072f78321c660283d46e104ae677220.exe
-
Size
908KB
-
Sample
241014-s1bj5swdmn
-
MD5
b072f78321c660283d46e104ae677220
-
SHA1
2e44bc7968414b3cb0ef78c22628979300f63091
-
SHA256
7cce81410195d653da5cd3d5e0a86f193d31bd16b70eed0604de8a15f5646fb9
-
SHA512
cfbad8b6014a88854906628ba2254d5f969693a41cb782e3bccde462e7f5d5f3cd0d7a7dd1db940e8ee35d885db57a5feaee7de936e60469d83536a9b8b024ed
-
SSDEEP
12288:rLkcoxg7v3qnC11ErwIhh0F4qwUgUny5QLvpmWdvDWMHdCZnAkW0TGTRUg8:ffmMv6Ckr7Mny5QLvYEb0pAkLiTRF8
Static task
static1
Behavioral task
behavioral1
Sample
b072f78321c660283d46e104ae677220.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b072f78321c660283d46e104ae677220.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7913958792:AAFOhfKo5L7M50XG6odxxQQwJAeD3zGEuJU/sendMessage?chat_id=7004340450
Targets
-
-
Target
b072f78321c660283d46e104ae677220.exe
-
Size
908KB
-
MD5
b072f78321c660283d46e104ae677220
-
SHA1
2e44bc7968414b3cb0ef78c22628979300f63091
-
SHA256
7cce81410195d653da5cd3d5e0a86f193d31bd16b70eed0604de8a15f5646fb9
-
SHA512
cfbad8b6014a88854906628ba2254d5f969693a41cb782e3bccde462e7f5d5f3cd0d7a7dd1db940e8ee35d885db57a5feaee7de936e60469d83536a9b8b024ed
-
SSDEEP
12288:rLkcoxg7v3qnC11ErwIhh0F4qwUgUny5QLvpmWdvDWMHdCZnAkW0TGTRUg8:ffmMv6Ckr7Mny5QLvYEb0pAkLiTRF8
-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-