General
-
Target
z349dth1eOtMzxuuRN.exe
-
Size
795KB
-
Sample
241106-rt67ss1hrc
-
MD5
bd19b42305c151d78f451b2cd76e1867
-
SHA1
6e0b260dc6fa468a102b86bca169abe5fad3ad77
-
SHA256
9e49f5122ac42ba8a4619dd7ba2252da4118b9fd1755d2bdf17e2d179a3f5128
-
SHA512
998abc5aad3731e0dca75ab50fe11d8359841f84ee4089dda9390a97ac1b4dc272aedd050bc3a2f41bc966df84dddb906c3c103133ace46504879c5d42d4c7c4
-
SSDEEP
12288:jTfNJmCKE2pb57IvNxDPbAIunfmjFLpsA2++GBSYrgCkkrJ6bb:jb2t5svzrbAnuzsp+lnz6f
Static task
static1
Behavioral task
behavioral1
Sample
z349dth1eOtMzxuuRN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
z349dth1eOtMzxuuRN.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7733074716:AAHPqUDZNcrQPzH_G03x5ppIOnkxZuz-Nyk/sendMessage?chat_id=7337843299
Targets
-
-
Target
z349dth1eOtMzxuuRN.exe
-
Size
795KB
-
MD5
bd19b42305c151d78f451b2cd76e1867
-
SHA1
6e0b260dc6fa468a102b86bca169abe5fad3ad77
-
SHA256
9e49f5122ac42ba8a4619dd7ba2252da4118b9fd1755d2bdf17e2d179a3f5128
-
SHA512
998abc5aad3731e0dca75ab50fe11d8359841f84ee4089dda9390a97ac1b4dc272aedd050bc3a2f41bc966df84dddb906c3c103133ace46504879c5d42d4c7c4
-
SSDEEP
12288:jTfNJmCKE2pb57IvNxDPbAIunfmjFLpsA2++GBSYrgCkkrJ6bb:jb2t5svzrbAnuzsp+lnz6f
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-