General
-
Target
d87d4991c4a32c635ebb3e24e1e5aabaa92b397afe5f0c28471e97c986b21144.exe
-
Size
128KB
-
Sample
250110-rwaavaxjas
-
MD5
ef77fad0f48dc9dafdb6833d92faadc3
-
SHA1
570c28749cf913d248049b8bbe127695675d6417
-
SHA256
d87d4991c4a32c635ebb3e24e1e5aabaa92b397afe5f0c28471e97c986b21144
-
SHA512
2110703d533254c9aa0acf4097a289a73b87ccd1c16d7af9b40b17b47047f4826086f78ff3f807be856f1884e1071e23b88688caac258d3ee17a5d1637fb33d0
-
SSDEEP
3072:Z99yINAgKjV545jbvk5Hbe7fMuJN07TcD1vzSF2XO9p9JbYsiTmWzwvcXrtgbY:kINAgKjV5Cjbvk5Hbe7fMuJN07T9bJis
Behavioral task
behavioral1
Sample
d87d4991c4a32c635ebb3e24e1e5aabaa92b397afe5f0c28471e97c986b21144.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d87d4991c4a32c635ebb3e24e1e5aabaa92b397afe5f0c28471e97c986b21144.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7979504653:AAFm_-f-R46w_TvBkt1kfgnnTRSttNIPYiY/sendMessage?chat_id=5600682828
Targets
-
-
Target
d87d4991c4a32c635ebb3e24e1e5aabaa92b397afe5f0c28471e97c986b21144.exe
-
Size
128KB
-
MD5
ef77fad0f48dc9dafdb6833d92faadc3
-
SHA1
570c28749cf913d248049b8bbe127695675d6417
-
SHA256
d87d4991c4a32c635ebb3e24e1e5aabaa92b397afe5f0c28471e97c986b21144
-
SHA512
2110703d533254c9aa0acf4097a289a73b87ccd1c16d7af9b40b17b47047f4826086f78ff3f807be856f1884e1071e23b88688caac258d3ee17a5d1637fb33d0
-
SSDEEP
3072:Z99yINAgKjV545jbvk5Hbe7fMuJN07TcD1vzSF2XO9p9JbYsiTmWzwvcXrtgbY:kINAgKjV5Cjbvk5Hbe7fMuJN07T9bJis
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-