General
-
Target
2c954cb7159b165ca9cf303c2b6f57f9e973e34de80119df704209ab6b07e080.exe
-
Size
997KB
-
Sample
241203-cn4gds1jaq
-
MD5
17ea6d6488e819fed8fd3902170e3a61
-
SHA1
4337787ac5d377021ac09608977a132116cbd26e
-
SHA256
2c954cb7159b165ca9cf303c2b6f57f9e973e34de80119df704209ab6b07e080
-
SHA512
4211ad65156658ece676c0c74f068e2d6c6ddf8ad35853ccf39054306410ae052e3c8ed52dd656ada0cfed727c6e356d09bbe99158b23114dbb08edd67843f2e
-
SSDEEP
24576:1u6J33O0c+JY5UZ+XC0kGso6FaRpVE23pp7XWY:Xu0c++OCvkGs9FaRpVXppSY
Static task
static1
Behavioral task
behavioral1
Sample
2c954cb7159b165ca9cf303c2b6f57f9e973e34de80119df704209ab6b07e080.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
2c954cb7159b165ca9cf303c2b6f57f9e973e34de80119df704209ab6b07e080.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot8105461233:AAGikrL-FY3clQOY-lg3KOIDOXSLgX28_TU/sendMessage?chat_id=6147266367
Targets
-
-
Target
2c954cb7159b165ca9cf303c2b6f57f9e973e34de80119df704209ab6b07e080.exe
-
Size
997KB
-
MD5
17ea6d6488e819fed8fd3902170e3a61
-
SHA1
4337787ac5d377021ac09608977a132116cbd26e
-
SHA256
2c954cb7159b165ca9cf303c2b6f57f9e973e34de80119df704209ab6b07e080
-
SHA512
4211ad65156658ece676c0c74f068e2d6c6ddf8ad35853ccf39054306410ae052e3c8ed52dd656ada0cfed727c6e356d09bbe99158b23114dbb08edd67843f2e
-
SSDEEP
24576:1u6J33O0c+JY5UZ+XC0kGso6FaRpVE23pp7XWY:Xu0c++OCvkGs9FaRpVXppSY
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-