General
-
Target
516c5e66abd3c3bc4e881fff254fa133df99c67db61698d924e96920ac1dee65.rar
-
Size
506KB
-
Sample
241129-dtyzjasjhx
-
MD5
614dd6711a599e1b8f6a5d75b48148a2
-
SHA1
31d39cb6167d7fcaf430863a200967df42d64cdf
-
SHA256
516c5e66abd3c3bc4e881fff254fa133df99c67db61698d924e96920ac1dee65
-
SHA512
7f78574613c378f1a6f41444edc6bee416e049df15dc825bb677932991c7c3a56ff96897295937c8bea090babf92ab79064a611bc53efd9287bb824fbd8780b1
-
SSDEEP
12288:EIUENXuTpyw1QOVEU5gCQFlNmquH1PCWQX8VsvmOvtJN:eE8pZ1kEgC4bmqCP+X8a/F
Static task
static1
Behavioral task
behavioral1
Sample
ZM-Z_2024-000343__SKM-0_000.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ZM-Z_2024-000343__SKM-0_000.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7578088265:AAHvd5E9MBWeIBV2JVvDWdTRg0KYKBSK8MM/sendMessage?chat_id=7365454061
Targets
-
-
Target
ZM-Z_2024-000343__SKM-0_000.exe
-
Size
983KB
-
MD5
aa90694a5cc7243dd249a056818a80ea
-
SHA1
aea0366ac02f19c0ea79053eb51f52f1949ea413
-
SHA256
47f122f668c4791cf3795a7c76e7f3682283bae4efd499d200bd80cc164b8948
-
SHA512
6c63e8a1eedd35fc22329554e1fabbf4cd6a5e3715a285941387ed9aba363b69c15cd102c441b06d1ea761525b62f188eb686b7778387d3f1e8b8ed5657087a8
-
SSDEEP
24576:Wtb20pkaCqT5TBWgNQ7a/ri1qXiYiU96A:DVg5tQ7a/ri1PYiI5
-
Snake Keylogger payload
-
Snakekeylogger family
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-