General
-
Target
3aad3c90b2113bf011c93db7987cce596fd1b0a94a3c36a9bad8d058effc33f5.exe
-
Size
666KB
-
Sample
241105-c5lmxasfqe
-
MD5
e5581411ae1315c19c0ac9e517f62ab9
-
SHA1
13c7fed727d29b0415ef046cd8f19b146ebb7703
-
SHA256
3aad3c90b2113bf011c93db7987cce596fd1b0a94a3c36a9bad8d058effc33f5
-
SHA512
2d672d16bbf59d727176a3c5d932e27ee09984ebbe49ced58bf99f766a825388900b802dc21327d9df05167a4ca37b42fc52414ab48a04253d09cf38801bf2e9
-
SSDEEP
12288:KM3ZJ8IWeQhfIXvwfTDaulTLNsk91j71zTW5btLBVRhgohA:PShfcvwntJsSj71ze5LL9hA
Static task
static1
Behavioral task
behavioral1
Sample
3aad3c90b2113bf011c93db7987cce596fd1b0a94a3c36a9bad8d058effc33f5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3aad3c90b2113bf011c93db7987cce596fd1b0a94a3c36a9bad8d058effc33f5.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7733074716:AAHPqUDZNcrQPzH_G03x5ppIOnkxZuz-Nyk/sendMessage?chat_id=7337843299
Targets
-
-
Target
3aad3c90b2113bf011c93db7987cce596fd1b0a94a3c36a9bad8d058effc33f5.exe
-
Size
666KB
-
MD5
e5581411ae1315c19c0ac9e517f62ab9
-
SHA1
13c7fed727d29b0415ef046cd8f19b146ebb7703
-
SHA256
3aad3c90b2113bf011c93db7987cce596fd1b0a94a3c36a9bad8d058effc33f5
-
SHA512
2d672d16bbf59d727176a3c5d932e27ee09984ebbe49ced58bf99f766a825388900b802dc21327d9df05167a4ca37b42fc52414ab48a04253d09cf38801bf2e9
-
SSDEEP
12288:KM3ZJ8IWeQhfIXvwfTDaulTLNsk91j71zTW5btLBVRhgohA:PShfcvwntJsSj71ze5LL9hA
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-