General
-
Target
493218a40cbf407847bbec867d10d27b58af8c60b75c1ff157a17c0feddb375d.exe
-
Size
642KB
-
Sample
241107-n3fjna1hqc
-
MD5
cf2eae297a86bb76ea41786fd1caa205
-
SHA1
30768a86b704f5b77534d8d33d2dcdd6b05717bb
-
SHA256
493218a40cbf407847bbec867d10d27b58af8c60b75c1ff157a17c0feddb375d
-
SHA512
52c721ac2b633379cb278e2df137c38f3f85508c7ccefbb98ef27246cdb305a3ee1dd38761aa93982e970ee344e4c129dc96437c0944ed530f0b13238cf5e384
-
SSDEEP
12288:NeVQrqGCF3PQxoMZ+wUhwBeBvwjNcvpmPTiPopguCYkLuF:NAQtE3IxoMZ+wUhFtnvpMTUo6uCYkq
Static task
static1
Behavioral task
behavioral1
Sample
493218a40cbf407847bbec867d10d27b58af8c60b75c1ff157a17c0feddb375d.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
493218a40cbf407847bbec867d10d27b58af8c60b75c1ff157a17c0feddb375d.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7719054034:AAHonYJDOpWskt5QdgdvYe662dLuhtscDqw/sendMessage?chat_id=6370711846
Targets
-
-
Target
493218a40cbf407847bbec867d10d27b58af8c60b75c1ff157a17c0feddb375d.exe
-
Size
642KB
-
MD5
cf2eae297a86bb76ea41786fd1caa205
-
SHA1
30768a86b704f5b77534d8d33d2dcdd6b05717bb
-
SHA256
493218a40cbf407847bbec867d10d27b58af8c60b75c1ff157a17c0feddb375d
-
SHA512
52c721ac2b633379cb278e2df137c38f3f85508c7ccefbb98ef27246cdb305a3ee1dd38761aa93982e970ee344e4c129dc96437c0944ed530f0b13238cf5e384
-
SSDEEP
12288:NeVQrqGCF3PQxoMZ+wUhwBeBvwjNcvpmPTiPopguCYkLuF:NAQtE3IxoMZ+wUhFtnvpMTUo6uCYkq
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-