General
-
Target
2553adadd29af4148be4c10f1771573b149006815374121bb802fa7599ab06f4.exe
-
Size
810KB
-
Sample
250114-cptnkstnbt
-
MD5
1feb066e46d1beed60404a2a6adb3d5a
-
SHA1
a8a8627b651f037647294992cef1dc0924a6abbb
-
SHA256
2553adadd29af4148be4c10f1771573b149006815374121bb802fa7599ab06f4
-
SHA512
13adac6a8aafc03608d04951f551c21a723081f800d311f4ff2061d145a6fe6a751a5ff69e42d980ddb8ef12633a846f92d3919714c8626d16d6fa61b750178f
-
SSDEEP
12288:paMaSzOKy2r7SPN+3TzXhMlJ/AeHvC/yj0YVYdjTLdUR2:wMaSSKy2/SPNUbhve6/yyZTxU
Static task
static1
Behavioral task
behavioral1
Sample
2553adadd29af4148be4c10f1771573b149006815374121bb802fa7599ab06f4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2553adadd29af4148be4c10f1771573b149006815374121bb802fa7599ab06f4.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7880085226:AAFn59bjY_5aEtKKH3yN4wktDN454dzF1lM/sendMessage?chat_id=6055880871
Targets
-
-
Target
2553adadd29af4148be4c10f1771573b149006815374121bb802fa7599ab06f4.exe
-
Size
810KB
-
MD5
1feb066e46d1beed60404a2a6adb3d5a
-
SHA1
a8a8627b651f037647294992cef1dc0924a6abbb
-
SHA256
2553adadd29af4148be4c10f1771573b149006815374121bb802fa7599ab06f4
-
SHA512
13adac6a8aafc03608d04951f551c21a723081f800d311f4ff2061d145a6fe6a751a5ff69e42d980ddb8ef12633a846f92d3919714c8626d16d6fa61b750178f
-
SSDEEP
12288:paMaSzOKy2r7SPN+3TzXhMlJ/AeHvC/yj0YVYdjTLdUR2:wMaSSKy2/SPNUbhve6/yyZTxU
-
Snake Keylogger payload
-
Snakekeylogger family
-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-