General
-
Target
ad711b0a8ab45a2b58d860086dee4ec3b6a13537861ee7e70aba8c59ea9d6d05
-
Size
499KB
-
Sample
241018-ca4j8szcje
-
MD5
0298478914d02b2cb0a41c204e7cf45f
-
SHA1
898a19b5288ed607b27aaa9d6b02a6c276577224
-
SHA256
ad711b0a8ab45a2b58d860086dee4ec3b6a13537861ee7e70aba8c59ea9d6d05
-
SHA512
c3c99fb0e7b205a8556203a72917f699b002aea14de61b016fe64896cc1caec27ec5ce5b591071b931addf17fa00da2c3a7f348be376a06ece7d6c24429e02a5
-
SSDEEP
12288:GNUSJediRu1XZNrNpykUW2Lq8/BMDW+WlOqpVs2TGYzcc9e:GtQku1TzDoOqpVZTGYzc8
Static task
static1
Behavioral task
behavioral1
Sample
ad711b0a8ab45a2b58d860086dee4ec3b6a13537861ee7e70aba8c59ea9d6d05.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ad711b0a8ab45a2b58d860086dee4ec3b6a13537861ee7e70aba8c59ea9d6d05.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7719054034:AAHonYJDOpWskt5QdgdvYe662dLuhtscDqw/sendMessage?chat_id=6370711846
Targets
-
-
Target
ad711b0a8ab45a2b58d860086dee4ec3b6a13537861ee7e70aba8c59ea9d6d05
-
Size
499KB
-
MD5
0298478914d02b2cb0a41c204e7cf45f
-
SHA1
898a19b5288ed607b27aaa9d6b02a6c276577224
-
SHA256
ad711b0a8ab45a2b58d860086dee4ec3b6a13537861ee7e70aba8c59ea9d6d05
-
SHA512
c3c99fb0e7b205a8556203a72917f699b002aea14de61b016fe64896cc1caec27ec5ce5b591071b931addf17fa00da2c3a7f348be376a06ece7d6c24429e02a5
-
SSDEEP
12288:GNUSJediRu1XZNrNpykUW2Lq8/BMDW+WlOqpVs2TGYzcc9e:GtQku1TzDoOqpVZTGYzc8
-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-