General
-
Target
9a0eddd3252af7bf52dfdace863a0bedbdaf434a87b365d06c5d3ad6c1533ee1
-
Size
502KB
-
Sample
250122-kn98yaylgn
-
MD5
d8438f3c083d3d74ceebc95032d000f2
-
SHA1
a92162740d68ac94231ed8e32398e4af7b1f0bc0
-
SHA256
9a0eddd3252af7bf52dfdace863a0bedbdaf434a87b365d06c5d3ad6c1533ee1
-
SHA512
e4c607681a2dbb0d8e8d3bbcfe48c653130602d32543674a2f93ca968b75b8228376fb4e66cd7a2df999a0e73cc61f70f5720c3cc96840b355768e0ee0ed6e0e
-
SSDEEP
12288:ueyzUieSa2BPOjrMnPEaYGAJ/bs9T5vqPD4dC0wa/he:ueyja22eMaYGAJ49T5qPME0wa/g
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order 24398.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Purchase Order 24398.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7810622048:AAGlXVtU9EeAX6sumC63y05EJISEAmugavs/sendMessage?chat_id=986310232
Targets
-
-
Target
Purchase Order 24398.exe
-
Size
587KB
-
MD5
9f9e89382132182cde0649f42b2b3d48
-
SHA1
31f54a2f7211f87081ce0ace0ba877c44ec07498
-
SHA256
f68aec391b587697af9129486e056f79d09618af911b62278e4a9cc7083daf90
-
SHA512
00410d6bc5043591644414b9b3a8ea83e6063e84a0bd9aa9da46d560a289c1a2bed2bde147f99b580dd6329eb180fc3d69796f432b68c1dc6d9c0f898d3e5b3b
-
SSDEEP
12288:QAWa+Mv+9MnaG/DlmlGLEHWUlaWuDVfrU/kpkqvdxovK+m:iY+OnhJmscWiavVrgkpkqvdxoid
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-