General
-
Target
CV ConstanzaMaranon..exe
-
Size
662KB
-
Sample
241028-c4dwnswkdv
-
MD5
e47f2d9717d088dea7b10a92b1750d84
-
SHA1
e85ae1f39df03fff301835728ace331d84bdffba
-
SHA256
7c79eb411ed860b232dbb4b7a63f08987b1caca1103e668185571a0c45d32de6
-
SHA512
14cc4e298f60d159a11a9bf349e183334efddc3cf220c54f9c0bcb9d60e5745e0b1d24105072cf7c1ced80ce860d5131f1260767370d4803a4a3a97cac507b26
-
SSDEEP
12288:0qGih5k3RIDdoAxMNqJLctHD7fC6Mt0/mbzhjC5+:m+5oRIDa3tjPMtqB
Static task
static1
Behavioral task
behavioral1
Sample
CV ConstanzaMaranon..exe
Resource
win10ltsc2021-20241023-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7925383692:AAHB0cxNGwsFVZxBJrUTW-AZ__B_KxqE6hk/sendMessage?chat_id=2146433139
Targets
-
-
Target
CV ConstanzaMaranon..exe
-
Size
662KB
-
MD5
e47f2d9717d088dea7b10a92b1750d84
-
SHA1
e85ae1f39df03fff301835728ace331d84bdffba
-
SHA256
7c79eb411ed860b232dbb4b7a63f08987b1caca1103e668185571a0c45d32de6
-
SHA512
14cc4e298f60d159a11a9bf349e183334efddc3cf220c54f9c0bcb9d60e5745e0b1d24105072cf7c1ced80ce860d5131f1260767370d4803a4a3a97cac507b26
-
SSDEEP
12288:0qGih5k3RIDdoAxMNqJLctHD7fC6Mt0/mbzhjC5+:m+5oRIDa3tjPMtqB
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-