General
-
Target
4d4c6fd4a56433abf2f9b0276733f99a25c932747d6883b678864839534fabba
-
Size
490KB
-
Sample
241112-jwteqa1nej
-
MD5
65e1e3ab3faf6d20b98aea53286df953
-
SHA1
86febefbc660884acc46cae89c0617d8263de6e4
-
SHA256
4d4c6fd4a56433abf2f9b0276733f99a25c932747d6883b678864839534fabba
-
SHA512
3cb7dc998696dd6f5aa695aa25aa24aa1b2c1240f57d43c9528b08ef51415314762923c1424908d178b4e6b6a4a1eeb0c1e589e6a8c785a645cbb741eaf270f2
-
SSDEEP
12288:1KIKCtyJQTu09J1mKiiBo2n1zow/B+pqBcG6xVOKho2smfvqhPemlp:IIY2J1mXiu2nJowYqBcG+VOKmino/lp
Static task
static1
Behavioral task
behavioral1
Sample
Curriculum Vitae Estrella Torres.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Curriculum Vitae Estrella Torres.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7985379579:AAFFNXAHJz6n24A6xEGgMMms826UxvjorNA/sendMessage?chat_id=6370711846
Targets
-
-
Target
Curriculum Vitae Estrella Torres.exe
-
Size
537KB
-
MD5
0462f4a2fb67f34f430c9b99b6a4dcc7
-
SHA1
bc571242e81f352620519e1d6b89f0765e91247a
-
SHA256
3a174b6021bf10996282e9934d284a2f8a3fdf5e34ef90f18da13e991bd60524
-
SHA512
1d2b50818cd4c8ffb960f0953674ee526dccbfad44b19ef1bb790672545689cd8213888b53d542b9b5c6cd11fa79a3eef6d1c12e969c865db8499a43be3e4922
-
SSDEEP
12288:HnTDIK6tQJQ209JhmKiTAWj0In1z5/V+ZqBwoYx6KXO7BNdQTUMv6:HTDIg2JhmXcZInJ5AqBwok6KXUBNLMv
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-