General
-
Target
Hesap.exe
-
Size
1.2MB
-
Sample
241111-rk7f7syrdt
-
MD5
3eb8af973b39893de7c6f4fc5357eadf
-
SHA1
b7cf1b022558fa58bb393ef0a527138dc20241a8
-
SHA256
e363e0167179a654868a1baf5ee3d94b858208a070c370e44476e823560d8a7d
-
SHA512
39c155cf04b16363691f5ae4dc529d2a1425190af39b6c8764db165b11e67f062546867eff12f75803b30aeb34a9dda5d6958504056213475d60cc02318c0829
-
SSDEEP
24576:25EmXFtKaL4/oFe5T9yyXYfP1ijXdaCYYhzi6BTjP5Dy1cQsDRJOw:2PVt/LZeJbInQRaCY9avR27mJ
Static task
static1
Behavioral task
behavioral1
Sample
Hesap.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Hesap.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7807072238:AAGtzAOTofEY8lBHcrZusyYa_emOxp-S_-s/sendMessage?chat_id=7361435574
Targets
-
-
Target
Hesap.exe
-
Size
1.2MB
-
MD5
3eb8af973b39893de7c6f4fc5357eadf
-
SHA1
b7cf1b022558fa58bb393ef0a527138dc20241a8
-
SHA256
e363e0167179a654868a1baf5ee3d94b858208a070c370e44476e823560d8a7d
-
SHA512
39c155cf04b16363691f5ae4dc529d2a1425190af39b6c8764db165b11e67f062546867eff12f75803b30aeb34a9dda5d6958504056213475d60cc02318c0829
-
SSDEEP
24576:25EmXFtKaL4/oFe5T9yyXYfP1ijXdaCYYhzi6BTjP5Dy1cQsDRJOw:2PVt/LZeJbInQRaCY9avR27mJ
-
Snake Keylogger payload
-
Snakekeylogger family
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-