General
-
Target
31e7de8dd45b9c37d9835a6e0a1bd09442e5701c19dca26a6e75e4b73474e4b2.exe
-
Size
1.1MB
-
Sample
241105-shwglasnhs
-
MD5
18b0596c7fc1fa919e0f7f9b2ab359a9
-
SHA1
8d0abbec28810b31b7d595af187e7ad0fe48b2c0
-
SHA256
31e7de8dd45b9c37d9835a6e0a1bd09442e5701c19dca26a6e75e4b73474e4b2
-
SHA512
faf01847e74e70bb3be228b8c404ca9333ca339572a71c4c720948af5a9275fbb9f1b0b1f53006866a6afc8283e688128dedf4df71f6c3c126eb5a59bc12cdda
-
SSDEEP
24576:ffmMv6Ckr7Mny5QLyOiNRk37ui1L6myyUm5dDFMB:f3v+7/5QLgRUaA5yyr5dJMB
Static task
static1
Behavioral task
behavioral1
Sample
31e7de8dd45b9c37d9835a6e0a1bd09442e5701c19dca26a6e75e4b73474e4b2.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
31e7de8dd45b9c37d9835a6e0a1bd09442e5701c19dca26a6e75e4b73474e4b2.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7498931539:AAE8KHb70FueL6YmOOF6rhS3Z3o-F1rx6_A/sendMessage?chat_id=1178171552
Targets
-
-
Target
31e7de8dd45b9c37d9835a6e0a1bd09442e5701c19dca26a6e75e4b73474e4b2.exe
-
Size
1.1MB
-
MD5
18b0596c7fc1fa919e0f7f9b2ab359a9
-
SHA1
8d0abbec28810b31b7d595af187e7ad0fe48b2c0
-
SHA256
31e7de8dd45b9c37d9835a6e0a1bd09442e5701c19dca26a6e75e4b73474e4b2
-
SHA512
faf01847e74e70bb3be228b8c404ca9333ca339572a71c4c720948af5a9275fbb9f1b0b1f53006866a6afc8283e688128dedf4df71f6c3c126eb5a59bc12cdda
-
SSDEEP
24576:ffmMv6Ckr7Mny5QLyOiNRk37ui1L6myyUm5dDFMB:f3v+7/5QLgRUaA5yyr5dJMB
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-