General
-
Target
5e919371446f20bd5527336cc32b2e31065e361ed4bdecfa9f6541904bfd2e1dN.exe
-
Size
972KB
-
Sample
250208-p6jk6axmgp
-
MD5
af600b457bbaccdb996b659fbd625fb0
-
SHA1
3323eec115392ab4d9aeb2a850bdf9751b57ab94
-
SHA256
5e919371446f20bd5527336cc32b2e31065e361ed4bdecfa9f6541904bfd2e1d
-
SHA512
9b0caf1dabc42a49cbccab44bb4bfdf640c24e81b3bdfa186271495281d8c0ab40ac62e493b6ad39b8a388745033284d2b1079c80390a895dd5ff6ec671a6b96
-
SSDEEP
24576:1AHnh+eWsN3skA4RV1Hom2KXFmIawe5h+ZZ5:kh+ZkldoPK1XaweE
Static task
static1
Behavioral task
behavioral1
Sample
5e919371446f20bd5527336cc32b2e31065e361ed4bdecfa9f6541904bfd2e1dN.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
5e919371446f20bd5527336cc32b2e31065e361ed4bdecfa9f6541904bfd2e1dN.exe
Resource
win10v2004-20250207-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot8127627165:AAGFfOIa-4HHjBTLcHJS0OQF2dLfXWXbuyo/sendMessage?chat_id=1413074050
Targets
-
-
Target
5e919371446f20bd5527336cc32b2e31065e361ed4bdecfa9f6541904bfd2e1dN.exe
-
Size
972KB
-
MD5
af600b457bbaccdb996b659fbd625fb0
-
SHA1
3323eec115392ab4d9aeb2a850bdf9751b57ab94
-
SHA256
5e919371446f20bd5527336cc32b2e31065e361ed4bdecfa9f6541904bfd2e1d
-
SHA512
9b0caf1dabc42a49cbccab44bb4bfdf640c24e81b3bdfa186271495281d8c0ab40ac62e493b6ad39b8a388745033284d2b1079c80390a895dd5ff6ec671a6b96
-
SSDEEP
24576:1AHnh+eWsN3skA4RV1Hom2KXFmIawe5h+ZZ5:kh+ZkldoPK1XaweE
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-