General
-
Target
FATURA.exe
-
Size
996KB
-
Sample
241128-1kw5xa1qf1
-
MD5
f643d0ec3aaba77a445b1aa1c739a950
-
SHA1
595437518041ca8664eadfda9cc27ae854b21f9c
-
SHA256
61b26d074e24a041f6e63e815dea5337b13e128d50dd47b5e45c94873806d9d5
-
SHA512
1959f947c2dcff170bc6173683ba84cf7863835d589cafe24c45545f5a0eb6020fc7e37438abfd692a95b29dadb160f86d49cae1254a7c298bf4aa192ce74080
-
SSDEEP
12288:Wtb20Qc3lT7af41ePBRYuQLKpqeUhbTv5OFgNuPPpHSgaaTwgqpH86x6A:Wtb20pkaCqT5TBWgNQ7aqwgqB86x6A
Static task
static1
Behavioral task
behavioral1
Sample
FATURA.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
FATURA.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7525931722:AAHv5VReYz4Tdv44qTVu1nWYViZknndh3TU/sendMessage?chat_id=7361435574
Targets
-
-
Target
FATURA.exe
-
Size
996KB
-
MD5
f643d0ec3aaba77a445b1aa1c739a950
-
SHA1
595437518041ca8664eadfda9cc27ae854b21f9c
-
SHA256
61b26d074e24a041f6e63e815dea5337b13e128d50dd47b5e45c94873806d9d5
-
SHA512
1959f947c2dcff170bc6173683ba84cf7863835d589cafe24c45545f5a0eb6020fc7e37438abfd692a95b29dadb160f86d49cae1254a7c298bf4aa192ce74080
-
SSDEEP
12288:Wtb20Qc3lT7af41ePBRYuQLKpqeUhbTv5OFgNuPPpHSgaaTwgqpH86x6A:Wtb20pkaCqT5TBWgNQ7aqwgqB86x6A
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-