General
-
Target
3d58d32a658515f1933ee63c92a7b9a06d2567fb310264e74adf19f55366d61d.exe
-
Size
1.3MB
-
Sample
250207-rmfq9stngy
-
MD5
87f99a784aef78e61dd44cb46ab204f4
-
SHA1
10fa8c6ac185186ad405b24df82b880bcd877e68
-
SHA256
3d58d32a658515f1933ee63c92a7b9a06d2567fb310264e74adf19f55366d61d
-
SHA512
d0cb92d83ca739d96587430638c33def6c5acbb995e11bd2f823d77cf038bac826ebc8fcf093e4e55e80fda4d92e83fbbbb6f88e909c5ec401d94bd28fe7820e
-
SSDEEP
12288:R7gcxkKaezJfzxfdrUska0P85kuZrB0OXYQbKixLnB3cjSektnKMkpmXOE9iEjHE:RSexfdrU/d8mQ1BgSkqrzj3WXWqHZGU
Static task
static1
Behavioral task
behavioral1
Sample
3d58d32a658515f1933ee63c92a7b9a06d2567fb310264e74adf19f55366d61d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3d58d32a658515f1933ee63c92a7b9a06d2567fb310264e74adf19f55366d61d.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7877050495:AAGvQgvVWi81kRnueu9bRetmq_FmSvNT1TI/sendMessage?chat_id=6055880871
Targets
-
-
Target
3d58d32a658515f1933ee63c92a7b9a06d2567fb310264e74adf19f55366d61d.exe
-
Size
1.3MB
-
MD5
87f99a784aef78e61dd44cb46ab204f4
-
SHA1
10fa8c6ac185186ad405b24df82b880bcd877e68
-
SHA256
3d58d32a658515f1933ee63c92a7b9a06d2567fb310264e74adf19f55366d61d
-
SHA512
d0cb92d83ca739d96587430638c33def6c5acbb995e11bd2f823d77cf038bac826ebc8fcf093e4e55e80fda4d92e83fbbbb6f88e909c5ec401d94bd28fe7820e
-
SSDEEP
12288:R7gcxkKaezJfzxfdrUska0P85kuZrB0OXYQbKixLnB3cjSektnKMkpmXOE9iEjHE:RSexfdrU/d8mQ1BgSkqrzj3WXWqHZGU
Score10/10-
Snake Keylogger payload
-
Snakekeylogger family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-