General
-
Target
5.exe
-
Size
793KB
-
Sample
241106-rdeslstnbq
-
MD5
6ce49a54158110b7e457631350b67604
-
SHA1
5e23b0c628d0e6d86ffb660de63b36c4e6b1bd59
-
SHA256
3328799cc7159d5313a6ef18c2167be55b53b5a390ce43f6910ca300f6830909
-
SHA512
b8e85215c89d9424d15a3a51e6c075276a57009bf8a01c74a87267a1829e950aa2036e0e9b63bc95c8c73c74f1313c997765aba70c185e22cd10c4d8b8d32d11
-
SSDEEP
12288:HTfq2mbKE2pb57I6iEn4KDVfzxIpz1ZNqrtB2i7koyTjAognGvb:Hk2t5s6iEnDANN+tB2i7koy4pnGD
Static task
static1
Behavioral task
behavioral1
Sample
5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7925383692:AAHB0cxNGwsFVZxBJrUTW-AZ__B_KxqE6hk/sendMessage?chat_id=2146433139
Targets
-
-
Target
5.exe
-
Size
793KB
-
MD5
6ce49a54158110b7e457631350b67604
-
SHA1
5e23b0c628d0e6d86ffb660de63b36c4e6b1bd59
-
SHA256
3328799cc7159d5313a6ef18c2167be55b53b5a390ce43f6910ca300f6830909
-
SHA512
b8e85215c89d9424d15a3a51e6c075276a57009bf8a01c74a87267a1829e950aa2036e0e9b63bc95c8c73c74f1313c997765aba70c185e22cd10c4d8b8d32d11
-
SSDEEP
12288:HTfq2mbKE2pb57I6iEn4KDVfzxIpz1ZNqrtB2i7koyTjAognGvb:Hk2t5s6iEnDANN+tB2i7koy4pnGD
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-