General
-
Target
ab8b90638c590345b423c272f13e84c888ec925224c29b4319555cc14621edb8.exe
-
Size
1.1MB
-
Sample
250205-eng99szqdq
-
MD5
b95ddd54b4aab9e71cf7820bb495d196
-
SHA1
700aeb210eb831122e06e280d150656106800753
-
SHA256
ab8b90638c590345b423c272f13e84c888ec925224c29b4319555cc14621edb8
-
SHA512
a04197b79fa2f65025c0f750d7201134965fc82b6c92a1bb79079b820f7fe17119f731ad1547708b4f4e4599b600e97f2066ce2afa528cb03b9bd90be3f10d93
-
SSDEEP
24576:hAHnh+eWsN3skA4RV1Hom2KXFmIaeuZK7CiU+WFwut295:4h+ZkldoPK1XaeuziUHGu6
Static task
static1
Behavioral task
behavioral1
Sample
ab8b90638c590345b423c272f13e84c888ec925224c29b4319555cc14621edb8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ab8b90638c590345b423c272f13e84c888ec925224c29b4319555cc14621edb8.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7817497413:AAH6fX2oZGM3XzbbIU69SVEGO80t6mDhjdU/sendMessage?chat_id=1695799026
Targets
-
-
Target
ab8b90638c590345b423c272f13e84c888ec925224c29b4319555cc14621edb8.exe
-
Size
1.1MB
-
MD5
b95ddd54b4aab9e71cf7820bb495d196
-
SHA1
700aeb210eb831122e06e280d150656106800753
-
SHA256
ab8b90638c590345b423c272f13e84c888ec925224c29b4319555cc14621edb8
-
SHA512
a04197b79fa2f65025c0f750d7201134965fc82b6c92a1bb79079b820f7fe17119f731ad1547708b4f4e4599b600e97f2066ce2afa528cb03b9bd90be3f10d93
-
SSDEEP
24576:hAHnh+eWsN3skA4RV1Hom2KXFmIaeuZK7CiU+WFwut295:4h+ZkldoPK1XaeuziUHGu6
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-