General
-
Target
f6d76bf6feb1be1dc008241ebe7f1378d4125b9e60357485124b4af9748dce13.exe
-
Size
1.0MB
-
Sample
250110-sa37gazndm
-
MD5
746eef70bac7aba1b57e9821e5d3010f
-
SHA1
253b25f0fa35132910a026abe1bd18c58b9a2145
-
SHA256
f6d76bf6feb1be1dc008241ebe7f1378d4125b9e60357485124b4af9748dce13
-
SHA512
92bd305113d6f9538e7ddafd6cb931c74feed87051cb6ef60ed342b8f83dba5dd52be417805e898fd2a1110725dca8865ee24846d9ae75bcd697b72a79c8beb2
-
SSDEEP
24576:LqDEvCTbMWu7rQYlBQcBiT6rprG8aHRk:LTvC/MTQYxsWR7aH
Static task
static1
Behavioral task
behavioral1
Sample
f6d76bf6feb1be1dc008241ebe7f1378d4125b9e60357485124b4af9748dce13.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f6d76bf6feb1be1dc008241ebe7f1378d4125b9e60357485124b4af9748dce13.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7525931722:AAHv5VReYz4Tdv44qTVu1nWYViZknndh3TU/sendMessage?chat_id=7361435574
Targets
-
-
Target
f6d76bf6feb1be1dc008241ebe7f1378d4125b9e60357485124b4af9748dce13.exe
-
Size
1.0MB
-
MD5
746eef70bac7aba1b57e9821e5d3010f
-
SHA1
253b25f0fa35132910a026abe1bd18c58b9a2145
-
SHA256
f6d76bf6feb1be1dc008241ebe7f1378d4125b9e60357485124b4af9748dce13
-
SHA512
92bd305113d6f9538e7ddafd6cb931c74feed87051cb6ef60ed342b8f83dba5dd52be417805e898fd2a1110725dca8865ee24846d9ae75bcd697b72a79c8beb2
-
SSDEEP
24576:LqDEvCTbMWu7rQYlBQcBiT6rprG8aHRk:LTvC/MTQYxsWR7aH
Score10/10-
Snake Keylogger payload
-
Snakekeylogger family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-