General
-
Target
55e4887d083e3db2ad9079519356a1a0f553317f2c8d9218939cb0020426b68a
-
Size
541KB
-
Sample
241106-l7szfaxmgv
-
MD5
4588a72d5e6d5e0de97a54ee3890f444
-
SHA1
096b5ec1fd61cffbdc354b251c06f9740333cf55
-
SHA256
55e4887d083e3db2ad9079519356a1a0f553317f2c8d9218939cb0020426b68a
-
SHA512
2d5e796f06d16b49a18654987f29a3849eeae65b9c4c2f832dfb7eef07e9e27ba85eddced171763799495d11cad1011bcc1c32e82e6de01403f89468faafe552
-
SSDEEP
12288:Lfy73+WX/iYwRFYIwWYdb1Kv2qn2wgROWU4UQ/ftl398CIFZ:Lfcb/6dwWKb1Kv2llBU2eCOZ
Static task
static1
Behavioral task
behavioral1
Sample
Curriculum Vitae Estrella Torres.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Curriculum Vitae Estrella Torres.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7719054034:AAHonYJDOpWskt5QdgdvYe662dLuhtscDqw/sendMessage?chat_id=6370711846
Targets
-
-
Target
Curriculum Vitae Estrella Torres.exe
-
Size
571KB
-
MD5
7030700ead128aab5df0db1675020937
-
SHA1
130d55bd32b2642fb27890a62e8eabd9b3b60611
-
SHA256
31af8e06fb179797320d0d79fce8a7c603e6156bb0b0642a41fe818b4894eb8f
-
SHA512
24718210a0562379e597ebef1b18731918d8e4907f29bc711f203282e1b674ce602bad6e872098eac23b801b44bd5d838c3b57f4b2951d0754a9ad550a7c6a2f
-
SSDEEP
12288:AcPZbEeX/sYw0q59eiXjS1SvAqnYwgJOAI4UUDJLqi6r59l:AcPh//m9ewe1SvArlPIkDzm5
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-