General
-
Target
fcb45401d06eddca3a0639caf5c5bbfa8171760c3324d2512303b0668fd6246a
-
Size
661KB
-
Sample
241107-xat11swpfs
-
MD5
c7469f0bb006bf553aa12f88c8a987a6
-
SHA1
8f829d02cad9f7ed7938f166027fb64f632ad46c
-
SHA256
fcb45401d06eddca3a0639caf5c5bbfa8171760c3324d2512303b0668fd6246a
-
SHA512
4108fee6ad68856997b1a5a1b668b7a2c70cadfc2e252d66df5cf01cdd383ed09ce725e53a4718c892d82903363057c74572de00d0bc72a02d7f35ff373e5996
-
SSDEEP
12288:2c1h7c6OBXGthrL68TEjRZ/bNQB1nXRpfpMDRZE/kitnEhsxVDnMKJhWqk:2c1hlOBXGoZQBNXRhpuTskiaAAo2
Static task
static1
Behavioral task
behavioral1
Sample
dMiiWEXyxKh1KsZ.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
dMiiWEXyxKh1KsZ.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7733074716:AAHPqUDZNcrQPzH_G03x5ppIOnkxZuz-Nyk/sendMessage?chat_id=7337843299
Targets
-
-
Target
dMiiWEXyxKh1KsZ.exe
-
Size
711KB
-
MD5
9cbc76422df47d71f92c5317656a8b1f
-
SHA1
8d2dc4881467375e5728bde0039d63d320dfa80f
-
SHA256
09f11da4c4722796e42555af0eaf04d325b7aa58961e8cf23bf081bb5cc6d4f0
-
SHA512
f6970fda5eccb82ab9d0a447c70ecadf2a69e0dc81ba590d3d2388fe54451f3db91fb7622e7ef56c993030c7fee5764bf3748f743ee59303b48aac41c6b84de4
-
SSDEEP
12288:U10e1F7Y7dXzut9rf68hdaptZecD/SiPbym2yEfXWXUGmkYe5/OMM8kS:U1F1FidXzuDaUcDSijX2tyX/OMZ
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-