General
-
Target
80a98cf22ecb8a4904bd619d065c52ec7f4e44c14419a66dfe705c13395520eb.exe
-
Size
637KB
-
Sample
241023-bze3havcjf
-
MD5
610851b503c9ae0d455c201d3974e7ef
-
SHA1
1984d665b20e4262b0c992560085874a2037d61e
-
SHA256
80a98cf22ecb8a4904bd619d065c52ec7f4e44c14419a66dfe705c13395520eb
-
SHA512
30babded0a57b9357a897f35c9043077dcc65bcee5d0ba9d8b49a07c43d7a76aeca3ada7d34497cb8822fa90a3c9b19a469cf1117c2cfdbfe3d5d2e1d3a42e76
-
SSDEEP
12288:dHuE6WGxLuyN+O5H/xJ/U+SgTgGq7XKoc6SagIa5+EuWLes:ATpHU+SsQOoc6+Ia8Ds
Static task
static1
Behavioral task
behavioral1
Sample
80a98cf22ecb8a4904bd619d065c52ec7f4e44c14419a66dfe705c13395520eb.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
80a98cf22ecb8a4904bd619d065c52ec7f4e44c14419a66dfe705c13395520eb.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7733074716:AAHPqUDZNcrQPzH_G03x5ppIOnkxZuz-Nyk/sendMessage?chat_id=7337843299
Targets
-
-
Target
80a98cf22ecb8a4904bd619d065c52ec7f4e44c14419a66dfe705c13395520eb.exe
-
Size
637KB
-
MD5
610851b503c9ae0d455c201d3974e7ef
-
SHA1
1984d665b20e4262b0c992560085874a2037d61e
-
SHA256
80a98cf22ecb8a4904bd619d065c52ec7f4e44c14419a66dfe705c13395520eb
-
SHA512
30babded0a57b9357a897f35c9043077dcc65bcee5d0ba9d8b49a07c43d7a76aeca3ada7d34497cb8822fa90a3c9b19a469cf1117c2cfdbfe3d5d2e1d3a42e76
-
SSDEEP
12288:dHuE6WGxLuyN+O5H/xJ/U+SgTgGq7XKoc6SagIa5+EuWLes:ATpHU+SsQOoc6+Ia8Ds
-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-