General
-
Target
6903ee61c27e0b70368c7e64506a1755cca04d839584cd723e18dc61448fd15b
-
Size
579KB
-
Sample
241202-rld62sxkby
-
MD5
8d9ab8f54e181d5e492e5749e9937e19
-
SHA1
43a60b73ae0cdfd9e84526e811f658a5023e8fd3
-
SHA256
6903ee61c27e0b70368c7e64506a1755cca04d839584cd723e18dc61448fd15b
-
SHA512
ec016435a76030d935e734a3150d02b43e6245cd01bfa56ff3acf67425e09a035336f2b6e501bc4666f53c0d623d59e176cbebfb2f79e8333e84dc5f66b19cc5
-
SSDEEP
12288:p9HuUjgVxIUpob23s/kPWLfd4MMxaih7EE6GbX4q0v3pAKkb:mUjAIxws8yf5Waih7Eircv+p
Static task
static1
Behavioral task
behavioral1
Sample
HALKBANK EFT RECEIPT DATED 02.12.2024.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
HALKBANK EFT RECEIPT DATED 02.12.2024.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot8105461233:AAGikrL-FY3clQOY-lg3KOIDOXSLgX28_TU/sendMessage?chat_id=6147266367
Targets
-
-
Target
HALKBANK EFT RECEIPT DATED 02.12.2024.exe
-
Size
997KB
-
MD5
17ea6d6488e819fed8fd3902170e3a61
-
SHA1
4337787ac5d377021ac09608977a132116cbd26e
-
SHA256
2c954cb7159b165ca9cf303c2b6f57f9e973e34de80119df704209ab6b07e080
-
SHA512
4211ad65156658ece676c0c74f068e2d6c6ddf8ad35853ccf39054306410ae052e3c8ed52dd656ada0cfed727c6e356d09bbe99158b23114dbb08edd67843f2e
-
SSDEEP
24576:1u6J33O0c+JY5UZ+XC0kGso6FaRpVE23pp7XWY:Xu0c++OCvkGs9FaRpVXppSY
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-