General
-
Target
0de41e3a816a005f0b35df372d0618253964b5be6945408d403e9b1292fb200f
-
Size
1.1MB
-
Sample
241113-wybc5sxckl
-
MD5
9a3633d66c81d5a2929a9314bc15e04a
-
SHA1
9ac79d99e83bdfe71d876292fb48979d9f6572af
-
SHA256
0de41e3a816a005f0b35df372d0618253964b5be6945408d403e9b1292fb200f
-
SHA512
98d9af9350d4083a3593c0c98cacc315ba0274b4badd0ec9e4294046e5c350806f69be7a7cf0fe0fb2172e4f3b012a2bd324c15c9b9e38ad328195e269fe179e
-
SSDEEP
24576:ffmMv6Ckr7Mny5QLL26iXWFsDsXbjVmUmG2/OE:f3v+7/5QLL2iaIrJma2/V
Static task
static1
Behavioral task
behavioral1
Sample
0de41e3a816a005f0b35df372d0618253964b5be6945408d403e9b1292fb200f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0de41e3a816a005f0b35df372d0618253964b5be6945408d403e9b1292fb200f.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot8069991368:AAEDxeDrVuH4v6iEp_2FvvnhUUBR7gnXopg/sendMessage?chat_id=6048393012
Targets
-
-
Target
0de41e3a816a005f0b35df372d0618253964b5be6945408d403e9b1292fb200f
-
Size
1.1MB
-
MD5
9a3633d66c81d5a2929a9314bc15e04a
-
SHA1
9ac79d99e83bdfe71d876292fb48979d9f6572af
-
SHA256
0de41e3a816a005f0b35df372d0618253964b5be6945408d403e9b1292fb200f
-
SHA512
98d9af9350d4083a3593c0c98cacc315ba0274b4badd0ec9e4294046e5c350806f69be7a7cf0fe0fb2172e4f3b012a2bd324c15c9b9e38ad328195e269fe179e
-
SSDEEP
24576:ffmMv6Ckr7Mny5QLL26iXWFsDsXbjVmUmG2/OE:f3v+7/5QLL2iaIrJma2/V
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-