General
-
Target
ac8eb55946044c480bbf293ca062a56329f389f14978856912932bfcf6321104
-
Size
906KB
-
Sample
241111-dabpws1cpp
-
MD5
1129d1e5393f199136aa2e16f6e560dc
-
SHA1
73255a76016c84fe667942d2551442840ea78f01
-
SHA256
ac8eb55946044c480bbf293ca062a56329f389f14978856912932bfcf6321104
-
SHA512
7be8402252fa70a717cca3ad2da2143a3c3af683b82e7d5d58e3eb04aaecbc9c484a83abdc227a098678d1b49304f56793e22509baa6394c5bcdbc0a0e2fd6b5
-
SSDEEP
24576:2rzMOmLLScrYNxj8u3WR3Wg/Q3RPS+3C8zfL4lvB:M6fSLGR37MPS+FzzY
Static task
static1
Behavioral task
behavioral1
Sample
MB263350411AE.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
MB263350411AE.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7814594885:AAHa3uCXluFI0wdWKPRtBnbO9yWlWuXuj84/sendMessage?chat_id=1178171552
Targets
-
-
Target
MB263350411AE.exe
-
Size
1.4MB
-
MD5
608294e129ad08c8a09b69b9597bf382
-
SHA1
d45e09a25a8f199046745a9fcdf37ce5b2213480
-
SHA256
6ce381a9173d54b9556e152b98b931d8dbbd9adaa6b2ccc8d5b50320d7ce2b70
-
SHA512
8ff9c82933fc7f3120c8941162ddbd4fbbd66b67975dd6831dcc678dc02abb6162833d10dc9a44458af7bd3f842ea68b1239eddec201f3144eb38a5861f1abe0
-
SSDEEP
24576:c5EmXFtKaL4/oFe5T9yyXYfP1ijXdaJkpv4vNaX167/Hrget0bMfukHhMT:cPVt/LZeJbInQRaJkGvQF67vUckkuq
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-