General
-
Target
a2bcf903e2e35f9d43de040568e1bd0312dd0943a29f8b87861ccf50e66e9957.exe
-
Size
685KB
-
Sample
241112-c871batapd
-
MD5
021cc64e8d10efd5bb37d8755e152872
-
SHA1
223fb05fd7c1fe294999de2456b725e098f1793e
-
SHA256
a2bcf903e2e35f9d43de040568e1bd0312dd0943a29f8b87861ccf50e66e9957
-
SHA512
3a63346aeb0a1abffbf542476e86369a71f0b8f0e1a8f8c3feb908a579e0e1fba7e14d62536b16cf11403cd763c22b78a9b6d42b987ede3d3ad31f5ea82d0cca
-
SSDEEP
12288:fgWVeEfxkEmbGq3rNV22td/HSLthAYLdG85KJDJVkA2/+L6:4WVeEZNmN3P22X6RNyDJyA2WL
Static task
static1
Behavioral task
behavioral1
Sample
a2bcf903e2e35f9d43de040568e1bd0312dd0943a29f8b87861ccf50e66e9957.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a2bcf903e2e35f9d43de040568e1bd0312dd0943a29f8b87861ccf50e66e9957.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot8142299351:AAFDTrtIpOoWWO5SiyZfI7QSQ2VJ59N65c8/sendMessage?chat_id=595808702
Targets
-
-
Target
a2bcf903e2e35f9d43de040568e1bd0312dd0943a29f8b87861ccf50e66e9957.exe
-
Size
685KB
-
MD5
021cc64e8d10efd5bb37d8755e152872
-
SHA1
223fb05fd7c1fe294999de2456b725e098f1793e
-
SHA256
a2bcf903e2e35f9d43de040568e1bd0312dd0943a29f8b87861ccf50e66e9957
-
SHA512
3a63346aeb0a1abffbf542476e86369a71f0b8f0e1a8f8c3feb908a579e0e1fba7e14d62536b16cf11403cd763c22b78a9b6d42b987ede3d3ad31f5ea82d0cca
-
SSDEEP
12288:fgWVeEfxkEmbGq3rNV22td/HSLthAYLdG85KJDJVkA2/+L6:4WVeEZNmN3P22X6RNyDJyA2WL
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-