General
-
Target
b4809d12158679aa7f01db86c54fa984305c8521a499b405ee130c5d91ed6540.exe
-
Size
643KB
-
Sample
241105-er56havepl
-
MD5
e1931fa7016c1b8df094b21a7f8ebe0c
-
SHA1
7a4d69111b1d379f942d78d9159ffbd3aec8ce86
-
SHA256
b4809d12158679aa7f01db86c54fa984305c8521a499b405ee130c5d91ed6540
-
SHA512
a989a304af36dac7c9c07dd609bd545c75cd4467e2c1a55875b2679a5e9d32f8a830c1ae2cd350d73a061defa322910d7373f2689a6a07bec3493bd965689a00
-
SSDEEP
12288:2lx3lhZfmvrOK9YrEHPThwK3qPl1ht24CPxHPYXCwT:w3l/f0OKirePThwkWcNZvYXCw
Static task
static1
Behavioral task
behavioral1
Sample
b4809d12158679aa7f01db86c54fa984305c8521a499b405ee130c5d91ed6540.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b4809d12158679aa7f01db86c54fa984305c8521a499b405ee130c5d91ed6540.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7925383692:AAHB0cxNGwsFVZxBJrUTW-AZ__B_KxqE6hk/sendMessage?chat_id=2146433139
Targets
-
-
Target
b4809d12158679aa7f01db86c54fa984305c8521a499b405ee130c5d91ed6540.exe
-
Size
643KB
-
MD5
e1931fa7016c1b8df094b21a7f8ebe0c
-
SHA1
7a4d69111b1d379f942d78d9159ffbd3aec8ce86
-
SHA256
b4809d12158679aa7f01db86c54fa984305c8521a499b405ee130c5d91ed6540
-
SHA512
a989a304af36dac7c9c07dd609bd545c75cd4467e2c1a55875b2679a5e9d32f8a830c1ae2cd350d73a061defa322910d7373f2689a6a07bec3493bd965689a00
-
SSDEEP
12288:2lx3lhZfmvrOK9YrEHPThwK3qPl1ht24CPxHPYXCwT:w3l/f0OKirePThwkWcNZvYXCw
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-