General
-
Target
55427a10e215f7f9ddbae56b7ccbbd3ced81a03d494669d27fa87bd0c72ef52e
-
Size
365KB
-
Sample
241127-dg5xbatmdy
-
MD5
a3f7a1e99195ae9260487c6b09a9bb9b
-
SHA1
513faf51cef0d52e8946cf4c6e3ca26e214f7e78
-
SHA256
55427a10e215f7f9ddbae56b7ccbbd3ced81a03d494669d27fa87bd0c72ef52e
-
SHA512
dda057f766ea7ea3103d5b9e9db7028d4b4ecdb2aa660fef37f774fed1587b757a6f454a4d16872833902cd1163aad73ad1a137f5af04f42fb11809a62381fab
-
SSDEEP
6144:UM8TV7mEwnTU0hFTSGLT8a4uTJvXytuBDv9Qw2uyqZHSbA78FqF2Fp1Kb4mgDFPA:UMK1mEoU0hVP8s1xBBRXZyb9q0F6b4mX
Static task
static1
Behavioral task
behavioral1
Sample
MT Griya Bugis Agency Appointment.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
MT Griya Bugis Agency Appointment.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7942215170:AAFCB6RsSfZIDvTqBntk3AScbXsHFZz3mf8/sendMessage?chat_id=2135869667
Targets
-
-
Target
MT Griya Bugis Agency Appointment.exe
-
Size
685KB
-
MD5
bae2409b9a15978efbbb6e9b2efac95d
-
SHA1
dc97a0db7a64f1aaf64c1f91ad2af04c962a5a8b
-
SHA256
335a4d0cba30db171813535723437e49fef1ca6adb02d8e201742dee4fb07242
-
SHA512
67cac5e7cbb21e6972c6786088e889f43739399b99b67b3118d4996413b7a6a52b758c3485ae0a68e216985759d37060ff8a6171079372ebda01e48c34dca07e
-
SSDEEP
12288:A1obJvDjvOo4V+tPQdx81IYaHMqL6AwETv:AoBDjvZRPQsEsqbBTv
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-