General
-
Target
5758229f9353e837db35d9556f8c30cb.bin
-
Size
594KB
-
Sample
241208-bp6gpszmgn
-
MD5
dec64f0ad79bfa08329f75a470dc9bef
-
SHA1
0274bd612f8e5d9e807c19f15a01aaf0247fd2cb
-
SHA256
82bf98b3ec60bcd34d5ee354d22528c21f8fcbf721f209a9a2cba4809d661627
-
SHA512
6bd46d93d494c82b69483b0b51c42f2a444321c79bbe0bfd3501b63f09cd9c561115ec52a4ddab81d9dc7b34924d1f21d1023b0b0577bd07ba133b5beab31f4f
-
SSDEEP
12288:qvYTo+rexd7PhjxREbqM4zxkCXxZ8BTqi2XJEodpHLJ6ijqWv2:qgE+Sr7PBx+4z22wQv6apllqWv2
Static task
static1
Behavioral task
behavioral1
Sample
9cf2882c93d6ab624569666974837d2f910412e2e5fcd66f62e655a7448bc693.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9cf2882c93d6ab624569666974837d2f910412e2e5fcd66f62e655a7448bc693.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7525931722:AAHv5VReYz4Tdv44qTVu1nWYViZknndh3TU/sendMessage?chat_id=7361435574
Targets
-
-
Target
9cf2882c93d6ab624569666974837d2f910412e2e5fcd66f62e655a7448bc693.exe
-
Size
1009KB
-
MD5
5758229f9353e837db35d9556f8c30cb
-
SHA1
424e24f9de8e1c014d19772ec4c052820c3e36e4
-
SHA256
9cf2882c93d6ab624569666974837d2f910412e2e5fcd66f62e655a7448bc693
-
SHA512
bc807007ff2fb7559345310456a81dade83bfe925c7aa896a46d9394124c531adfe9ef387a7cb94c5d3788d4bac1669131d4884725163b1f94e29b760fe97874
-
SSDEEP
24576:zu6J33O0c+JY5UZ+XC0kGso6FaDBSRT8n7LvoAWY:du0c++OCvkGs9FaDBSRTgXvSY
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-