General
-
Target
2530ca42857b5d025729fb7736ab224b407ffdbe7039a6c962f1f6e3b706b3d8
-
Size
826KB
-
Sample
250206-z62rvayqeq
-
MD5
b3b46efad9dac8cd52ffc04fd149f805
-
SHA1
421f5c82cce3af81ebe1381817c03a5554837a6f
-
SHA256
2530ca42857b5d025729fb7736ab224b407ffdbe7039a6c962f1f6e3b706b3d8
-
SHA512
7626f6f5eaca0491c156046f80c92e69d303ef6a2a9460bd3e37158e491556dc88698e52b26696f5d7e33cff722f23be938a195e2f868b26a79cc03a8cc6ff36
-
SSDEEP
12288:ULkUMXe5y/t1u9OF8IKLMwAL/6HEuwPtqGMyRQCbZ1uhPH7bUk6x:ULm8IKLMx72E9qbCbZ1U7bU3x
Static task
static1
Behavioral task
behavioral1
Sample
2530ca42857b5d025729fb7736ab224b407ffdbe7039a6c962f1f6e3b706b3d8.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2530ca42857b5d025729fb7736ab224b407ffdbe7039a6c962f1f6e3b706b3d8.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7817497413:AAH6fX2oZGM3XzbbIU69SVEGO80t6mDhjdU/sendMessage?chat_id=1695799026
Targets
-
-
Target
2530ca42857b5d025729fb7736ab224b407ffdbe7039a6c962f1f6e3b706b3d8
-
Size
826KB
-
MD5
b3b46efad9dac8cd52ffc04fd149f805
-
SHA1
421f5c82cce3af81ebe1381817c03a5554837a6f
-
SHA256
2530ca42857b5d025729fb7736ab224b407ffdbe7039a6c962f1f6e3b706b3d8
-
SHA512
7626f6f5eaca0491c156046f80c92e69d303ef6a2a9460bd3e37158e491556dc88698e52b26696f5d7e33cff722f23be938a195e2f868b26a79cc03a8cc6ff36
-
SSDEEP
12288:ULkUMXe5y/t1u9OF8IKLMwAL/6HEuwPtqGMyRQCbZ1uhPH7bUk6x:ULm8IKLMx72E9qbCbZ1U7bU3x
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-