General
-
Target
4dd290b26a372dbce70e2804f4cb514d8d2ad621d6844acb9933d72efdcb893f
-
Size
685KB
-
Sample
241116-w46fga1fnd
-
MD5
2032c338e04d0b5a60eef3f7b7328891
-
SHA1
352126118e6c6ce3c595c6ac589a70b96cdcc322
-
SHA256
4dd290b26a372dbce70e2804f4cb514d8d2ad621d6844acb9933d72efdcb893f
-
SHA512
7aea68700ce219007212c465be4dd752e04f16584cfdfdcb0bf56f99b357f731934e00ae0efc5c5dab29ad5a5735e280ac37a0c425c2a78009875195aacb2696
-
SSDEEP
12288:G0mnA1zA7zDwONNpP0cldbpH3RfKNmucxdiUWIJiGar9t3DSDb4N5:uA1zALdNpPRllR3NUmuq016Bg3ewH
Static task
static1
Behavioral task
behavioral1
Sample
4dd290b26a372dbce70e2804f4cb514d8d2ad621d6844acb9933d72efdcb893f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4dd290b26a372dbce70e2804f4cb514d8d2ad621d6844acb9933d72efdcb893f.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Formaalsbestemmelsens/Omraadenummers.ps1
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Formaalsbestemmelsens/Omraadenummers.ps1
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7610532139:AAFiI3HHwFD6pWziyPu3lWJbRKPQtz0nD2c/sendMessage?chat_id=6680692809
Targets
-
-
Target
4dd290b26a372dbce70e2804f4cb514d8d2ad621d6844acb9933d72efdcb893f
-
Size
685KB
-
MD5
2032c338e04d0b5a60eef3f7b7328891
-
SHA1
352126118e6c6ce3c595c6ac589a70b96cdcc322
-
SHA256
4dd290b26a372dbce70e2804f4cb514d8d2ad621d6844acb9933d72efdcb893f
-
SHA512
7aea68700ce219007212c465be4dd752e04f16584cfdfdcb0bf56f99b357f731934e00ae0efc5c5dab29ad5a5735e280ac37a0c425c2a78009875195aacb2696
-
SSDEEP
12288:G0mnA1zA7zDwONNpP0cldbpH3RfKNmucxdiUWIJiGar9t3DSDb4N5:uA1zALdNpPRllR3NUmuq016Bg3ewH
Score10/10-
Snake Keylogger payload
-
Snakekeylogger family
-
Blocklisted process makes network request
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
Formaalsbestemmelsens/Omraadenummers.Ter
-
Size
52KB
-
MD5
d6f8f522a812d7fe69126e347b3d9ca2
-
SHA1
3b2f8aa331cb4b435dd736b9ae1ed8ee6a5f1a28
-
SHA256
224fc25fabc123f64dcd7b8343ccdcf3398b0735c9c4604c6cdc6e2f4e270721
-
SHA512
7ec46b8c274c1a86e04ec72fb34c6081a5f47c6e1ddb5aeb2a69ea3fd70b7ee01c69842310bc11a84f6d1abb4cda1b13c0fdd4c9a47fda09ca7d819f2c6e278c
-
SSDEEP
1536:aSYMsWFDKzJv6bkzrRfOfNqHG3Nbt49lKSY5g2z3S:aSaW8tvBGFqHG3Nby9lKbS2zC
Score8/10-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-