General
-
Target
03da1152cc2fc2bcfafc441c76ddcda09e4df84adb27bda9b267694b4a840cf7.exe
-
Size
998KB
-
Sample
250110-rh311awnes
-
MD5
04a2cce147e8b29d89ef24af80d493ce
-
SHA1
5e24a62c496a9726bb924c1bb0f3b5e33963b0c6
-
SHA256
03da1152cc2fc2bcfafc441c76ddcda09e4df84adb27bda9b267694b4a840cf7
-
SHA512
5c623045f3b388f150fe1659d55da24d89c35aef09d74a3a5fc90431608241213c9e9a64af118cc1caf1601a3effb1fb572d1c98c2c6695db1349e54fb2e1b22
-
SSDEEP
24576:+u6J33O0c+JY5UZ+XC0kGso6Faei2PbeZqC/pO0WY:Qu0c++OCvkGs9FaeTP6MY
Static task
static1
Behavioral task
behavioral1
Sample
03da1152cc2fc2bcfafc441c76ddcda09e4df84adb27bda9b267694b4a840cf7.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
03da1152cc2fc2bcfafc441c76ddcda09e4df84adb27bda9b267694b4a840cf7.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7767004773:AAG_mBqrFYZNr81F28ktwLAJ3brPq5BTRzg/sendMessage?chat_id=1217600190
Targets
-
-
Target
03da1152cc2fc2bcfafc441c76ddcda09e4df84adb27bda9b267694b4a840cf7.exe
-
Size
998KB
-
MD5
04a2cce147e8b29d89ef24af80d493ce
-
SHA1
5e24a62c496a9726bb924c1bb0f3b5e33963b0c6
-
SHA256
03da1152cc2fc2bcfafc441c76ddcda09e4df84adb27bda9b267694b4a840cf7
-
SHA512
5c623045f3b388f150fe1659d55da24d89c35aef09d74a3a5fc90431608241213c9e9a64af118cc1caf1601a3effb1fb572d1c98c2c6695db1349e54fb2e1b22
-
SSDEEP
24576:+u6J33O0c+JY5UZ+XC0kGso6Faei2PbeZqC/pO0WY:Qu0c++OCvkGs9FaeTP6MY
Score10/10-
Snake Keylogger payload
-
Snakekeylogger family
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-