General
-
Target
539ee7af02fcbd28659831dd774581f76ee66ca6238d12af286158f2f343f3b8.exe
-
Size
2.1MB
-
Sample
250110-rx789syrhq
-
MD5
022dbaa1df24d488b03ecb058a521613
-
SHA1
9f12948c741b6b27cce58d4cd804a2f988feddf2
-
SHA256
539ee7af02fcbd28659831dd774581f76ee66ca6238d12af286158f2f343f3b8
-
SHA512
1d23c5d6a8b384e2c746865da221a14d6cb7f9260597c4785ae527798e9215027bbc089b5214389ff2bbae180ba6cbec547df6c5d901ff6a56d2fb4909e50880
-
SSDEEP
49152:0l328U2yfZrnJhlp9tHfYoEaTSiz23THT3WSMpDgF/qB0Rj6KIeVSc/zui:a30DfJJhX/LEQkF/qBk6K2c/ii
Static task
static1
Behavioral task
behavioral1
Sample
539ee7af02fcbd28659831dd774581f76ee66ca6238d12af286158f2f343f3b8.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
539ee7af02fcbd28659831dd774581f76ee66ca6238d12af286158f2f343f3b8.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot1628099890:AAEoyPqXzUZV0NK78yRGbDMLJqRw0vcASbg/sendMessage?chat_id=1217600190
Targets
-
-
Target
539ee7af02fcbd28659831dd774581f76ee66ca6238d12af286158f2f343f3b8.exe
-
Size
2.1MB
-
MD5
022dbaa1df24d488b03ecb058a521613
-
SHA1
9f12948c741b6b27cce58d4cd804a2f988feddf2
-
SHA256
539ee7af02fcbd28659831dd774581f76ee66ca6238d12af286158f2f343f3b8
-
SHA512
1d23c5d6a8b384e2c746865da221a14d6cb7f9260597c4785ae527798e9215027bbc089b5214389ff2bbae180ba6cbec547df6c5d901ff6a56d2fb4909e50880
-
SSDEEP
49152:0l328U2yfZrnJhlp9tHfYoEaTSiz23THT3WSMpDgF/qB0Rj6KIeVSc/zui:a30DfJJhX/LEQkF/qBk6K2c/ii
Score10/10-
Snake Keylogger payload
-
Snakekeylogger family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-