General
-
Target
z17Mz7zumpwTUMRxyS.exe
-
Size
678KB
-
Sample
241031-v3pwna1hpg
-
MD5
337574f09ff0a772aedbd6f7c2064496
-
SHA1
f24b5b9369763cc23758407fa1729294750d8e5e
-
SHA256
96bfa7096fb76234a5774f70dc444d719c7553ac83db00fdbb04c1eec318d4c4
-
SHA512
2cf83e21895266cf05e65bc4934c09c8aba59fe9a1db62b07ec2dd4e463d5a4555d46c1e1ae74447c7c5e120885d72027ec763fb32634ba63441ef9e519d3d26
-
SSDEEP
12288:tn9Inte+7jOOIQ7vCSfm5F28BaaiR+fzszuSFtQhU1atc2/Q4AyrrRPdw:tK7tIS8QaikfgqSFtcUUa2o4JPd
Static task
static1
Behavioral task
behavioral1
Sample
z17Mz7zumpwTUMRxyS.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
z17Mz7zumpwTUMRxyS.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7733074716:AAHPqUDZNcrQPzH_G03x5ppIOnkxZuz-Nyk/sendMessage?chat_id=7337843299
Targets
-
-
Target
z17Mz7zumpwTUMRxyS.exe
-
Size
678KB
-
MD5
337574f09ff0a772aedbd6f7c2064496
-
SHA1
f24b5b9369763cc23758407fa1729294750d8e5e
-
SHA256
96bfa7096fb76234a5774f70dc444d719c7553ac83db00fdbb04c1eec318d4c4
-
SHA512
2cf83e21895266cf05e65bc4934c09c8aba59fe9a1db62b07ec2dd4e463d5a4555d46c1e1ae74447c7c5e120885d72027ec763fb32634ba63441ef9e519d3d26
-
SSDEEP
12288:tn9Inte+7jOOIQ7vCSfm5F28BaaiR+fzszuSFtQhU1atc2/Q4AyrrRPdw:tK7tIS8QaikfgqSFtcUUa2o4JPd
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-