General
-
Target
5950103f0c1085852ec034428df971dd6cadf7e1812008e5ca775463af6213ee
-
Size
634KB
-
Sample
241118-hygm9s1fma
-
MD5
2029b052e7738a5e9ab7c4cf7dbc37ee
-
SHA1
b145f5095334c7fb88b1af6421f01bb324deb91a
-
SHA256
5950103f0c1085852ec034428df971dd6cadf7e1812008e5ca775463af6213ee
-
SHA512
c8f917c8be8010a5839c1669b04c4bb4c10fa07a1e890d29e87049d0936ef958709551a7e243c59ecd91a8346bac8827ad783dc081a2fbf93694681e7e95a246
-
SSDEEP
12288:oW+qVyNvTVjMwukqSIvEa1hSLj51Ly027bzrg8Tz797uQMf5HnJhme18SPjY0Qi:8zNTukqSIckh09cH797eZJhmlSjWi
Static task
static1
Behavioral task
behavioral1
Sample
SOA Oct 24.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SOA Oct 24.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7399492470:AAF1Q52TLq6uEICFiCVrLu9dpROnjh2wukI/sendMessage?chat_id=1443320838
Targets
-
-
Target
SOA Oct 24.exe
-
Size
1.1MB
-
MD5
10169da08bb0f39076b33dfbd5ff8bcd
-
SHA1
7867e87076e8cb3f160ad91c28d48a15ce573174
-
SHA256
da468beb20714dfb771a050b460cf9a00e2123a6a05c19f67a20242cb5d37b0d
-
SHA512
1ce4f6cf44dbe682f443795d9e8f46bf22b2e6482fbe01cd1d6bc8547c9e157cd7185ca868d7c01fc0531ccec915ab994f381e6b045abdadfd78e023b953b0eb
-
SSDEEP
24576:ztb20pkaCqT5TBWgNQ7a2Eu9icOzK3+3kkz6A:wVg5tQ7a2EnT+O0+5
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-