General
-
Target
Solicitud de cotizacion Stro1268975.zip
-
Size
493KB
-
Sample
241113-tbc74sverq
-
MD5
b714adf835e0e5514bbb17603741c12d
-
SHA1
330cac4a0d305a74cae9810a64cf7974a8b2349c
-
SHA256
4ff1c3892a4c9c170b9f464f1bcd244b2cf6d68e60d561eda9a259e45bd2da90
-
SHA512
820b208fd3bdfd0ae874982a77eb7e4f0f832460bf765638e120bfa2a0dcbd15a5a2b4f2d4c21a074063103be6fa18179d49255bc0b212d6bb476ca32cd64d82
-
SSDEEP
12288:GeZdsUHm08MZ6UzzjuvlwHB8am30Zxzbf8oBu6ytwq:7q6vZ6Uzzj0wyas0b7D06yz
Static task
static1
Behavioral task
behavioral1
Sample
Solicitud de cotizacion Stro1268975.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Solicitud de cotizacion Stro1268975.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7985379579:AAFFNXAHJz6n24A6xEGgMMms826UxvjorNA/sendMessage?chat_id=6370711846
Targets
-
-
Target
Solicitud de cotizacion Stro1268975.exe
-
Size
546KB
-
MD5
0f84f8f18907b23ecde50b2b7025f5fb
-
SHA1
5a1286f0e3cd47e365e250fce43f0cc3bd53a818
-
SHA256
4d9269d0c5706adc5a898408e788b15e5cdf9e490ccdec4c52aec64b8f8c63a2
-
SHA512
4ee294079372694ec9e9eda80ef23b5384bfc172f6d55dcd55407704b82420cb728973de3d4e4306fbeaaa31446e9d10f6bf0f218787b9959fc44026d334ccc9
-
SSDEEP
12288:WMyCaKNF6Z6YtzjuKNoWTwHBgaSf0XThDVwoBkHZzD:WMytxZ6Ytzj9mWTwKaI0NhnKP
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-