General
-
Target
NEW ORDER 4016291 240043.ace
-
Size
527KB
-
Sample
241023-jsvhls1bpm
-
MD5
5eb0b3923138b463207070d773a93693
-
SHA1
cd1a9ca12289acf171a8cf4918ffd1bb67d76223
-
SHA256
cdf24f64ae6cdb81c320151a17631ce36525204ce75e4cbe70efd2e84578bc35
-
SHA512
0139f62bb63f1b03aa2a863068daca6dc4c53d54c364b896caa89caf3f7c9b1119db7f2aab3d58735fa8de92cfae5411d38a14c55e448f595087844aefa96023
-
SSDEEP
12288:GUWM5kpKHGXPAvmgMfuP7761RTI3BvefjhpJhM68T7b6o1ysM+k9156:GE5gKIAegMfuPi1RjvMVT7WoUsM+kDQ
Static task
static1
Behavioral task
behavioral1
Sample
NEW ORDER 4016291 240043.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
NEW ORDER 4016291 240043.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot8142299351:AAFDTrtIpOoWWO5SiyZfI7QSQ2VJ59N65c8/sendMessage?chat_id=595808702
Targets
-
-
Target
NEW ORDER 4016291 240043.exe
-
Size
644KB
-
MD5
f732e3f360a08319d434ddab7d14c54b
-
SHA1
e085c99c0b2ceb1b67666673401d0c5a80cc1688
-
SHA256
c66ae68bb8b705111729acd9afdd0285355bd8fa87e963af02a63ab79476a639
-
SHA512
3b48b5bcaf43fdb258e70345be282042681a895562d6c3cc7dc08df667aacbba5b3f3bcc44c496f14b22be56d24083d63d6282a453d63935d619472266e465ba
-
SSDEEP
12288:NoTtqGBa15pfdobPeJtcKxqaXgY3kXT7EdNGyMh:NoTPQlabGrcK59oodNGF
-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-