General
-
Target
e39c2886cca7aca486312e770a9cd3d01ca4e9824d43557cbebab1fb1a14e359.exe
-
Size
955KB
-
Sample
241114-dt92sstgjr
-
MD5
038e4e206bb1f4d698b3f5eeafc926c8
-
SHA1
ad42b907f3d604f57550ce0441ab78e451848967
-
SHA256
e39c2886cca7aca486312e770a9cd3d01ca4e9824d43557cbebab1fb1a14e359
-
SHA512
800cf85683966750f757097900331963911ef077ba8f45660f5d743b14b12ab830481fc33581e75218d9eeb8cfa7a8a53f8eccb17371228ae0522522b178fed7
-
SSDEEP
12288:itb20Qc3lT7af41ePBRYuQLKpqeUhbTv5OFgNuPPpHSga37g6tYqS6A:itb20pkaCqT5TBWgNQ7aLguS6A
Static task
static1
Behavioral task
behavioral1
Sample
e39c2886cca7aca486312e770a9cd3d01ca4e9824d43557cbebab1fb1a14e359.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e39c2886cca7aca486312e770a9cd3d01ca4e9824d43557cbebab1fb1a14e359.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7591642187:AAF3F6-zxp3HwWsP9s4_QJW4W-aEGhjsvDI/sendMessage?chat_id=6557702940
Targets
-
-
Target
e39c2886cca7aca486312e770a9cd3d01ca4e9824d43557cbebab1fb1a14e359.exe
-
Size
955KB
-
MD5
038e4e206bb1f4d698b3f5eeafc926c8
-
SHA1
ad42b907f3d604f57550ce0441ab78e451848967
-
SHA256
e39c2886cca7aca486312e770a9cd3d01ca4e9824d43557cbebab1fb1a14e359
-
SHA512
800cf85683966750f757097900331963911ef077ba8f45660f5d743b14b12ab830481fc33581e75218d9eeb8cfa7a8a53f8eccb17371228ae0522522b178fed7
-
SSDEEP
12288:itb20Qc3lT7af41ePBRYuQLKpqeUhbTv5OFgNuPPpHSga37g6tYqS6A:itb20pkaCqT5TBWgNQ7aLguS6A
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-