General
-
Target
f3a2990ee13d135a48a1e392882b4386be4259704ad4ac2e82398901bf1313b3.exe
-
Size
996KB
-
Sample
241203-dp6htaxla1
-
MD5
17a7feed2e38ee63d467a6adda8fd604
-
SHA1
103ce31f4b3e7c040bd97f09262b44788c064827
-
SHA256
f3a2990ee13d135a48a1e392882b4386be4259704ad4ac2e82398901bf1313b3
-
SHA512
599d54a09a0151f6288d415f1499bfaed34000cf473aa2ae07caa2dc350219f35bcc98ecd60b55e4601f50c68a0e50e53909a22a0cbc4e31ae39a980f6a3d681
-
SSDEEP
24576:Wtb20pkaCqT5TBWgNQ7a7R8vY/ujlvYw6A:DVg5tQ7a7r/uRvd5
Static task
static1
Behavioral task
behavioral1
Sample
f3a2990ee13d135a48a1e392882b4386be4259704ad4ac2e82398901bf1313b3.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f3a2990ee13d135a48a1e392882b4386be4259704ad4ac2e82398901bf1313b3.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot8133286026:AAGeoCC9PBFfy6_m7BYTQffAk1yO8Lvnbd0/sendMessage?chat_id=6359577280
Targets
-
-
Target
f3a2990ee13d135a48a1e392882b4386be4259704ad4ac2e82398901bf1313b3.exe
-
Size
996KB
-
MD5
17a7feed2e38ee63d467a6adda8fd604
-
SHA1
103ce31f4b3e7c040bd97f09262b44788c064827
-
SHA256
f3a2990ee13d135a48a1e392882b4386be4259704ad4ac2e82398901bf1313b3
-
SHA512
599d54a09a0151f6288d415f1499bfaed34000cf473aa2ae07caa2dc350219f35bcc98ecd60b55e4601f50c68a0e50e53909a22a0cbc4e31ae39a980f6a3d681
-
SSDEEP
24576:Wtb20pkaCqT5TBWgNQ7a7R8vY/ujlvYw6A:DVg5tQ7a7r/uRvd5
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-