General
-
Target
a7ac92c130b490bf02e9e87922d0a4e45735b7478915a0f687d8fbb2e1d90c00
-
Size
326KB
-
Sample
241210-ffqr4syqgj
-
MD5
b9bbf526eef810b198dc2928008326bc
-
SHA1
d081556aaeab78c0ebf99d81cc101229cd7fd100
-
SHA256
a7ac92c130b490bf02e9e87922d0a4e45735b7478915a0f687d8fbb2e1d90c00
-
SHA512
7ba5f8c895df89c2de930f558d8ce00e0c88c51c279bbf0a048cd2c2d581201d09ff330c28b8fe192f819e61a4e7e1de1507c54a8aef60dd86dd2d97e1f9c4d9
-
SSDEEP
6144:INc502uT99A0J2psf9gyWCj44LF6sbRb9WRuwjZ3TcK4ElpuVsGVxMV678:INk0dA0X1x/1LYuwFAEloyGnyR
Static task
static1
Behavioral task
behavioral1
Sample
vessel particulars.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
vessel particulars.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot8043217727:AAHet_KMDJubZguJgq0Cp7yrQCzgcnbbXpU/sendMessage?chat_id=6247294228
Targets
-
-
Target
vessel particulars.exe
-
Size
540KB
-
MD5
74d70f8356487059e8162b3d95477890
-
SHA1
e579054b9325db2af1b137daf424df95f71cd97f
-
SHA256
2c2a013dbc6d7012967ca889d283b0b572e7ca4cf3ac39e9e21ba27e60893996
-
SHA512
1bafd419b3ab6c260d0ca1893688c411f7a07209358f939edbacbdfd277e507f7a933d88c29df3e2d56eb8db12b72c535701a5068e69ad870aebd3f157a5cf0e
-
SSDEEP
12288:oiU+RfWk1j15DQZC4oiEMxYWiy2XQ4RPlA24:oi3fWi2ZC41Ejy2Xpf
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-