General
-
Target
698460c425a25a679f4810434424ae3bed1615f38502e53f1dfd7969034656af
-
Size
625KB
-
Sample
241127-jxr82s1qfr
-
MD5
6e6a0abf83664ca36145be65dd190adb
-
SHA1
d4024641c4becafb3319d6b4577f34dfbe227133
-
SHA256
698460c425a25a679f4810434424ae3bed1615f38502e53f1dfd7969034656af
-
SHA512
c3972f5fded7e80d650d5ce077dd0ac5eb0d298b0a68b974ba4b690665443985cebee842bf6e246a5000a6470a122749ed39b940e646fa28c83219631439dfa8
-
SSDEEP
12288:rj9FDPEGMBIl91xAJlq4e7yaj51La027E6s9qzCbVcJXOr5Ze2bURACBjXTo/f:v3DPEGMBS9IJlqlt1WCbVcJUZWu6jXTy
Static task
static1
Behavioral task
behavioral1
Sample
INQUIRY SPM-2412547 [W_ID36-61442].exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
INQUIRY SPM-2412547 [W_ID36-61442].exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7399492470:AAF1Q52TLq6uEICFiCVrLu9dpROnjh2wukI/sendMessage?chat_id=1443320838
Targets
-
-
Target
INQUIRY SPM-2412547 [W_ID36-61442].exe
-
Size
1.1MB
-
MD5
064a3d834a62d73b76d9c91e36b98e05
-
SHA1
c036160cb0ff789a41b21a75b4fc47cd718f49bc
-
SHA256
b821ff32a1b0314cfa230a212103305d18695e4c95e3d94fd69097db8019833c
-
SHA512
9d65b5f225261e764f74db0755bad4156cb5c3fd897510477945ca23fa220df324891b4a6719cd935196f3ae0186483a183bd5d7df461cd705863307337d7ebe
-
SSDEEP
24576:9tb20pkaCqT5TBWgNQ7aExRr0EEFcdo6A:uVg5tQ7aExReFN5
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-