General
-
Target
22102024_0142_21102024_Mensaje Swift MT103 anticipo del 30%.zip
-
Size
545KB
-
Sample
241022-b4yqeazare
-
MD5
dae0ec4e516ba51f712e73d235e11c5c
-
SHA1
9095b52dc529221e5e89ff084ac1346774ef1ca0
-
SHA256
7c5d489aa28087d93601f2ccc4cb3f8a91d1264dd6988862392ec361f6827ec1
-
SHA512
7b0229dcb78be525014da1134b602a5c748efaf89aca15fb1bf1d4fbae18e8363ebc627d51ecaf4caedb23d124ad3a48a4c0dd6c22d86a0cd5c0ae330dd58934
-
SSDEEP
12288:/R4hGOEltaRdnpF2UHk7Jycpd1Cs1rknosowQOvgw/axOR:/R4hvEDaPp1k7JycMsdIosowQG/1
Static task
static1
Behavioral task
behavioral1
Sample
Mensaje Swift MT103 anticipo del 30%.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Mensaje Swift MT103 anticipo del 30%.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7719054034:AAHonYJDOpWskt5QdgdvYe662dLuhtscDqw/sendMessage?chat_id=6370711846
Targets
-
-
Target
Mensaje Swift MT103 anticipo del 30%.exe
-
Size
587KB
-
MD5
3341f173f0721ff20596b776b7a92d32
-
SHA1
6fb3226dd28c16d1223546acce7b5e11973e1c6e
-
SHA256
db518b1b20c2bacd07d2150a675f12b47b07cb303b0070295ea2a74dccc8385f
-
SHA512
7b054cb8275ebd2882a4a45ce83fc90ad9ba40cc32939653d9757bee2a84b124dbe38896e3edcfcb382b1538013f15c1a1afe4f7de320c4ff5a007ab3321d680
-
SSDEEP
12288:UjEkhMOoltiJCxDopdCKW2YrkflyUpR3Ms130Ya1G9qODQ/8i4:sEkh5oDiJCip4jkflyUEsB0YB9Bo
-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-