General
-
Target
CV Paula Galarza..ace
-
Size
601KB
-
Sample
241022-q8ntbsybmg
-
MD5
e2f0ad968655f5325e1b6717001360d4
-
SHA1
35e9c5c1226a39cae6d77dd5f95db369b026c561
-
SHA256
05a910be5ce56cf94d2901938d26df92e209cad9defa333d39c082f698fba019
-
SHA512
cd1ea5af1442c1b8521fc3bcf0327cf630442e767099ddacb51b2e4c028e63308ceefc7b0d7f1da0e27b7a7f1e2b197ba80cef278f76e22e7309e49446627d6e
-
SSDEEP
12288:VQ7CQn377KHot7RS9Efhtc4JA19jkmaHUjUlC3hM+Hh2z+6IQNy3aysg:VaCG377RRB/JQUHUjU7+B2z1ItKysg
Static task
static1
Behavioral task
behavioral1
Sample
CV Paula Galarza..exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
CV Paula Galarza..exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7925383692:AAHB0cxNGwsFVZxBJrUTW-AZ__B_KxqE6hk/sendMessage?chat_id=2146433139
Targets
-
-
Target
CV Paula Galarza..exe
-
Size
787KB
-
MD5
8a80513ce862e3f47158dfa82e208965
-
SHA1
9c68e9526062abd665666f10e0520850bf19727e
-
SHA256
8aa17384f8bbf04f91228b1e1a58f22fb086bd91d5f1803d69c710607a2e511e
-
SHA512
5e90bb9a1df25d6c202b720c9325bc122095570287876612843fd8347fbc418444240880fe9cb7d36a10500f16e7e3e2fe0dcf429b9c664a9ba2fb63b6df0374
-
SSDEEP
12288:9eYTBDtQFWKDvedwIiyNGm3ds26oECTBEHwg5b3Pz0CapC:nWFbvedJrNBmAfTOh5b3Pc
-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-