General
-
Target
867d87b1d5e651a0c09864996a672e11ebc6a81f986f26e1daef27f62754f9f2.exe
-
Size
1.1MB
-
Sample
250207-rj6hhsvnhm
-
MD5
27d2d287421f2898832b43749be9b874
-
SHA1
39cd5a044f117ab03e5973d4838fa63042a1e81f
-
SHA256
867d87b1d5e651a0c09864996a672e11ebc6a81f986f26e1daef27f62754f9f2
-
SHA512
1a1d7f842b6bb210da2c629bf2396849333c3ed099c3dce363df050d149a2c03feab4e84bfcc56a6b79f75d83df407c89cf96e724983768b65dcb99ea35b2ef7
-
SSDEEP
24576:Utb20pkaCqT5TBWgNQ7aBMw70USmJo9yVviMI6A:9Vg5tQ7aBdrVq5
Static task
static1
Behavioral task
behavioral1
Sample
867d87b1d5e651a0c09864996a672e11ebc6a81f986f26e1daef27f62754f9f2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
867d87b1d5e651a0c09864996a672e11ebc6a81f986f26e1daef27f62754f9f2.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot8061096285:AAEYYo-FdY3VzqcT3L8EdN5KV_wk8MmCyiw/sendMessage?chat_id=6557702940
Targets
-
-
Target
867d87b1d5e651a0c09864996a672e11ebc6a81f986f26e1daef27f62754f9f2.exe
-
Size
1.1MB
-
MD5
27d2d287421f2898832b43749be9b874
-
SHA1
39cd5a044f117ab03e5973d4838fa63042a1e81f
-
SHA256
867d87b1d5e651a0c09864996a672e11ebc6a81f986f26e1daef27f62754f9f2
-
SHA512
1a1d7f842b6bb210da2c629bf2396849333c3ed099c3dce363df050d149a2c03feab4e84bfcc56a6b79f75d83df407c89cf96e724983768b65dcb99ea35b2ef7
-
SSDEEP
24576:Utb20pkaCqT5TBWgNQ7aBMw70USmJo9yVviMI6A:9Vg5tQ7aBdrVq5
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-