General
-
Target
979c906c8edaaafe866628eca9911b766c686da4e69d899c401b0d317b4f1628.exe
-
Size
480KB
-
Sample
241213-c926fsxqek
-
MD5
0f8fc2216d672397def371eeec7e7ab2
-
SHA1
878e50322452353934614f673fe08e594c278062
-
SHA256
979c906c8edaaafe866628eca9911b766c686da4e69d899c401b0d317b4f1628
-
SHA512
71a7508ac223d76226897d60e1be76a988348fbaa102bc29741c3df847d5d541510ac7a6ecba33afe437d6849e045463f7b53fc34a55a4c296e30b7d128b0134
-
SSDEEP
12288:bL5HNcQWMWd+H+/wg4H+HMqAA5eJjcab2jWIFsLl6wGA:b12dtwgtHMHA5eqRHFslDGA
Static task
static1
Behavioral task
behavioral1
Sample
979c906c8edaaafe866628eca9911b766c686da4e69d899c401b0d317b4f1628.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
979c906c8edaaafe866628eca9911b766c686da4e69d899c401b0d317b4f1628.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7924749806:AAG-WJhqQVHwMR7UVUYahs5tVC-3tNXnruE/sendMessage?chat_id=7009913093
Targets
-
-
Target
979c906c8edaaafe866628eca9911b766c686da4e69d899c401b0d317b4f1628.exe
-
Size
480KB
-
MD5
0f8fc2216d672397def371eeec7e7ab2
-
SHA1
878e50322452353934614f673fe08e594c278062
-
SHA256
979c906c8edaaafe866628eca9911b766c686da4e69d899c401b0d317b4f1628
-
SHA512
71a7508ac223d76226897d60e1be76a988348fbaa102bc29741c3df847d5d541510ac7a6ecba33afe437d6849e045463f7b53fc34a55a4c296e30b7d128b0134
-
SSDEEP
12288:bL5HNcQWMWd+H+/wg4H+HMqAA5eJjcab2jWIFsLl6wGA:b12dtwgtHMHA5eqRHFslDGA
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-