General
-
Target
35c3bb009e452f96d12f08807cd4b689855e77215893c9c19aafd7569596094c
-
Size
6KB
-
Sample
241211-zpdnpasnam
-
MD5
26d84053046215e0e938ad51bea23989
-
SHA1
4858798c04d7938ca2821b5ae9a8e7fa4a949ef4
-
SHA256
35c3bb009e452f96d12f08807cd4b689855e77215893c9c19aafd7569596094c
-
SHA512
cbcf459a344d29a94eaae7c3b8f00bf3e0997e91dfc2dcce7c490c56485afa07bff0a9b9d3713af9cacc7405a2e6d6b4bbca0fd86ea8179130b0374da434334a
-
SSDEEP
48:66o+1ZV71cIxePbGaeDC9gvz6ew9/NOjwYrYO9VMI40qclsu3ACtD+le0aFdhpfG:GuFxaiaeDCjujBP3hqu1qwRzNt
Static task
static1
Behavioral task
behavioral1
Sample
35c3bb009e452f96d12f08807cd4b689855e77215893c9c19aafd7569596094c.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
35c3bb009e452f96d12f08807cd4b689855e77215893c9c19aafd7569596094c.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7575386281:AAH_oCv72vkYnhVFkW8Yan64MZfx3OFkaUk/sendMessage?chat_id=5302361040
Targets
-
-
Target
35c3bb009e452f96d12f08807cd4b689855e77215893c9c19aafd7569596094c
-
Size
6KB
-
MD5
26d84053046215e0e938ad51bea23989
-
SHA1
4858798c04d7938ca2821b5ae9a8e7fa4a949ef4
-
SHA256
35c3bb009e452f96d12f08807cd4b689855e77215893c9c19aafd7569596094c
-
SHA512
cbcf459a344d29a94eaae7c3b8f00bf3e0997e91dfc2dcce7c490c56485afa07bff0a9b9d3713af9cacc7405a2e6d6b4bbca0fd86ea8179130b0374da434334a
-
SSDEEP
48:66o+1ZV71cIxePbGaeDC9gvz6ew9/NOjwYrYO9VMI40qclsu3ACtD+le0aFdhpfG:GuFxaiaeDCjujBP3hqu1qwRzNt
-
Snake Keylogger payload
-
Snakekeylogger family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-