General
-
Target
26102024_0054_25102024_Curriculum Vitae.zip
-
Size
594KB
-
Sample
241026-a9cjpavjep
-
MD5
360147fced49db2a8f21bb0b1ea76a82
-
SHA1
3da193308b1292871f396d62aeebea3aa56d52d8
-
SHA256
b4959d3ecdb2bcc546b4d00f0902a1dc1e6b81c1627db1e5867c805aea65f495
-
SHA512
9272aee1423e9825ea91f1f7b7f29f26030c99e5dd9819e8aae82b687b368d354c467bbed41a1df2388b15f761ae0937bef474b32bfc0018fe7fda61e0605ff8
-
SSDEEP
12288:JN1BMg1Fhhqo/KsfSiAeRdY432buNN8HUGeWQAN0gPYhoFjA:JN1SYF1NfGeRV2buN98whOjA
Static task
static1
Behavioral task
behavioral1
Sample
Curriculum Vitae.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Curriculum Vitae.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7719054034:AAHonYJDOpWskt5QdgdvYe662dLuhtscDqw/sendMessage?chat_id=6370711846
Targets
-
-
Target
Curriculum Vitae.exe
-
Size
663KB
-
MD5
6c0dfef9d3fd776a33284c57e72e210f
-
SHA1
f39d49085f8099bde2f617e838cf3f93a55d798d
-
SHA256
8b0cf5a006d406708e02f6a031e9f633ca10d4d5937b177ac560a816c09d69be
-
SHA512
029540a1a0ee4ea3cc0a710f16dd8267556371f1e1963a6001a8f55af7dc06f731ed33b42ec5cbed4e6139dce6ef3b92a840c7a6488a5d3f82b08b5b3fd2b758
-
SSDEEP
12288:Sv1gekF95mo/isf+iakRdWMR2bu5NcH2G2WuADwWP2hoT6H:cmvF1FfokRX2bu59KOhM6H
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-