General
-
Target
0eb8abfd2709e701ef3a5263c404a107e328537af080cd9e976fa199eb5d8894.exe
-
Size
1004KB
-
Sample
250111-crj7xsynex
-
MD5
286d68b773e946b301bd7134769a58e6
-
SHA1
82004957c97f892b7ae6025c333bc6da0b17ca1a
-
SHA256
0eb8abfd2709e701ef3a5263c404a107e328537af080cd9e976fa199eb5d8894
-
SHA512
a4a4d4ba2abb064106bacbe92da3006be0176aec44282410fc56cdf32fea7611863b2b477de7799f7a8d5588305d66626cfcc13d46ae39e1c32d502e127313ae
-
SSDEEP
24576:du6J33O0c+JY5UZ+XC0kGso6FaONm/SWCEr41WY:vu0c++OCvkGs9FaONBWJrJY
Static task
static1
Behavioral task
behavioral1
Sample
0eb8abfd2709e701ef3a5263c404a107e328537af080cd9e976fa199eb5d8894.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
0eb8abfd2709e701ef3a5263c404a107e328537af080cd9e976fa199eb5d8894.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7838541807:AAEJadvLoc1DBjJfseqmrMSpZAXwRkaHwwk/sendMessage?chat_id=7488699642
Targets
-
-
Target
0eb8abfd2709e701ef3a5263c404a107e328537af080cd9e976fa199eb5d8894.exe
-
Size
1004KB
-
MD5
286d68b773e946b301bd7134769a58e6
-
SHA1
82004957c97f892b7ae6025c333bc6da0b17ca1a
-
SHA256
0eb8abfd2709e701ef3a5263c404a107e328537af080cd9e976fa199eb5d8894
-
SHA512
a4a4d4ba2abb064106bacbe92da3006be0176aec44282410fc56cdf32fea7611863b2b477de7799f7a8d5588305d66626cfcc13d46ae39e1c32d502e127313ae
-
SSDEEP
24576:du6J33O0c+JY5UZ+XC0kGso6FaONm/SWCEr41WY:vu0c++OCvkGs9FaONBWJrJY
Score10/10-
Snake Keylogger payload
-
Snakekeylogger family
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-