General
-
Target
a1d084c5e89063825e6c866845ee8643a76e1f337880fd0852402bc8d714a7c7.exe
-
Size
1.0MB
-
Sample
241222-ahff9svqhj
-
MD5
1f0e9cdd4105d32138f3df2510c94e21
-
SHA1
82ee58715ae7cd9ca42070e942b77f3691e52c2c
-
SHA256
a1d084c5e89063825e6c866845ee8643a76e1f337880fd0852402bc8d714a7c7
-
SHA512
13ad4f7bb2841ae17c53266d07d3172dbf33f1d418515681662be7ce87bdbc7f67ffb9fee1233732f80d1c82bec5cf7a5f770f096b8105f60297a4affd061b54
-
SSDEEP
24576:lqDEvCTbMWu7rQYlBQcBiT6rprG8aAouMeM:lTvC/MTQYxsWR7aAU
Static task
static1
Behavioral task
behavioral1
Sample
a1d084c5e89063825e6c866845ee8643a76e1f337880fd0852402bc8d714a7c7.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a1d084c5e89063825e6c866845ee8643a76e1f337880fd0852402bc8d714a7c7.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7249279970:AAEcJhrnjOjEPF0_qNK65RAY0sYYfNqc0Sg/sendMessage?chat_id=7365454061
Targets
-
-
Target
a1d084c5e89063825e6c866845ee8643a76e1f337880fd0852402bc8d714a7c7.exe
-
Size
1.0MB
-
MD5
1f0e9cdd4105d32138f3df2510c94e21
-
SHA1
82ee58715ae7cd9ca42070e942b77f3691e52c2c
-
SHA256
a1d084c5e89063825e6c866845ee8643a76e1f337880fd0852402bc8d714a7c7
-
SHA512
13ad4f7bb2841ae17c53266d07d3172dbf33f1d418515681662be7ce87bdbc7f67ffb9fee1233732f80d1c82bec5cf7a5f770f096b8105f60297a4affd061b54
-
SSDEEP
24576:lqDEvCTbMWu7rQYlBQcBiT6rprG8aAouMeM:lTvC/MTQYxsWR7aAU
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-