General
-
Target
54f08d458c3a9b5b6553e6bc6810fd9071d7bc2a517576d4dcc45b1ca0a47d1fN.exe
-
Size
545KB
-
Sample
241210-xrm9sszjel
-
MD5
47310e2d76477f79641f8703027a60b0
-
SHA1
bba7157bfab11d11b6912cb0012e117de61d175a
-
SHA256
54f08d458c3a9b5b6553e6bc6810fd9071d7bc2a517576d4dcc45b1ca0a47d1f
-
SHA512
ccf55e9915002e828feec50c58ec1ccac378c0b1a1e081e5b2e542457ff4a2866aebaeeeb40bfe6188938b4e1dc0bc1c770e33a012752d28429f8b14ed7fb7f7
-
SSDEEP
12288:NquErHF6xC9D6DmR1J98w4oknqOOCyQfZYQignEMlsFqqYJiWn1:wrl6kD68JmlotQfZsgnEHPWn1
Behavioral task
behavioral1
Sample
54f08d458c3a9b5b6553e6bc6810fd9071d7bc2a517576d4dcc45b1ca0a47d1fN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
54f08d458c3a9b5b6553e6bc6810fd9071d7bc2a517576d4dcc45b1ca0a47d1fN.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot1628099890:AAEoyPqXzUZV0NK78yRGbDMLJqRw0vcASbg/sendMessage?chat_id=1217600190
Targets
-
-
Target
54f08d458c3a9b5b6553e6bc6810fd9071d7bc2a517576d4dcc45b1ca0a47d1fN.exe
-
Size
545KB
-
MD5
47310e2d76477f79641f8703027a60b0
-
SHA1
bba7157bfab11d11b6912cb0012e117de61d175a
-
SHA256
54f08d458c3a9b5b6553e6bc6810fd9071d7bc2a517576d4dcc45b1ca0a47d1f
-
SHA512
ccf55e9915002e828feec50c58ec1ccac378c0b1a1e081e5b2e542457ff4a2866aebaeeeb40bfe6188938b4e1dc0bc1c770e33a012752d28429f8b14ed7fb7f7
-
SSDEEP
12288:NquErHF6xC9D6DmR1J98w4oknqOOCyQfZYQignEMlsFqqYJiWn1:wrl6kD68JmlotQfZsgnEHPWn1
-
Snake Keylogger payload
-
Snakekeylogger family
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-