General
-
Target
22af294596a94c94df1e13966f16af73ab4246c11866a75a7d2a095ae6a91f7eN.exe
-
Size
1.0MB
-
Sample
241222-hnxxhayjex
-
MD5
988f9a70417a5ee4f7d4d3e0b3ed71f0
-
SHA1
4a1b003b6bd958160d3f27cb362ed8230f83f842
-
SHA256
22af294596a94c94df1e13966f16af73ab4246c11866a75a7d2a095ae6a91f7e
-
SHA512
d087b8f4d40fc9ea89eb6720274c8d6b39bf861710c0c939b24aa3f0f5c8bd78b3c7866acd5712cb130a5369b10524ed3666b85072ea57af389ca4146e531701
-
SSDEEP
24576:lqDEvCTbMWu7rQYlBQcBiT6rprG8aAouMe:lTvC/MTQYxsWR7aA
Static task
static1
Behavioral task
behavioral1
Sample
22af294596a94c94df1e13966f16af73ab4246c11866a75a7d2a095ae6a91f7eN.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
22af294596a94c94df1e13966f16af73ab4246c11866a75a7d2a095ae6a91f7eN.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7249279970:AAEcJhrnjOjEPF0_qNK65RAY0sYYfNqc0Sg/sendMessage?chat_id=7365454061
Targets
-
-
Target
22af294596a94c94df1e13966f16af73ab4246c11866a75a7d2a095ae6a91f7eN.exe
-
Size
1.0MB
-
MD5
988f9a70417a5ee4f7d4d3e0b3ed71f0
-
SHA1
4a1b003b6bd958160d3f27cb362ed8230f83f842
-
SHA256
22af294596a94c94df1e13966f16af73ab4246c11866a75a7d2a095ae6a91f7e
-
SHA512
d087b8f4d40fc9ea89eb6720274c8d6b39bf861710c0c939b24aa3f0f5c8bd78b3c7866acd5712cb130a5369b10524ed3666b85072ea57af389ca4146e531701
-
SSDEEP
24576:lqDEvCTbMWu7rQYlBQcBiT6rprG8aAouMe:lTvC/MTQYxsWR7aA
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-