General
-
Target
3.exe
-
Size
571KB
-
Sample
241106-nflgdsyhqg
-
MD5
7030700ead128aab5df0db1675020937
-
SHA1
130d55bd32b2642fb27890a62e8eabd9b3b60611
-
SHA256
31af8e06fb179797320d0d79fce8a7c603e6156bb0b0642a41fe818b4894eb8f
-
SHA512
24718210a0562379e597ebef1b18731918d8e4907f29bc711f203282e1b674ce602bad6e872098eac23b801b44bd5d838c3b57f4b2951d0754a9ad550a7c6a2f
-
SSDEEP
12288:AcPZbEeX/sYw0q59eiXjS1SvAqnYwgJOAI4UUDJLqi6r59l:AcPh//m9ewe1SvArlPIkDzm5
Static task
static1
Behavioral task
behavioral1
Sample
3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7719054034:AAHonYJDOpWskt5QdgdvYe662dLuhtscDqw/sendMessage?chat_id=6370711846
Targets
-
-
Target
3.exe
-
Size
571KB
-
MD5
7030700ead128aab5df0db1675020937
-
SHA1
130d55bd32b2642fb27890a62e8eabd9b3b60611
-
SHA256
31af8e06fb179797320d0d79fce8a7c603e6156bb0b0642a41fe818b4894eb8f
-
SHA512
24718210a0562379e597ebef1b18731918d8e4907f29bc711f203282e1b674ce602bad6e872098eac23b801b44bd5d838c3b57f4b2951d0754a9ad550a7c6a2f
-
SSDEEP
12288:AcPZbEeX/sYw0q59eiXjS1SvAqnYwgJOAI4UUDJLqi6r59l:AcPh//m9ewe1SvArlPIkDzm5
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-