General
-
Target
z91NUEVALISTADEPEDIDOSVENOKLERINTPDF.exe
-
Size
745KB
-
Sample
250211-rkvgmsvraj
-
MD5
6fda43cabb3f068d38bc6bc1de5990b4
-
SHA1
d5e4f33e9957ac4bf91d757106708fb94f92d91d
-
SHA256
d5fc860d01e3c7e3a46a4cbb98f8c654e7533f4ecfb25218c00f4bac9061f6c8
-
SHA512
6a299357ce6d1d96661377c57b9279a5d31d26323c507f1a54a6a54cf57bd22fce3f91b5f7c6d6edb72999f6785b548f513f7460e8c99c672c01f85798fb7c26
-
SSDEEP
12288:ehkDgouVA2nxKkorvdRgQriDwOIxmxiZnYQE7PJcE4aCbVpGVln4:uRmJkcoQricOIQxiZY1iaCbAln4
Static task
static1
Behavioral task
behavioral1
Sample
z91NUEVALISTADEPEDIDOSVENOKLERINTPDF.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
z91NUEVALISTADEPEDIDOSVENOKLERINTPDF.exe
Resource
win10v2004-20250207-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7920003586:AAHBMriHaNCFiZ4OQ4NdecriTbdf93HSOJo/sendMessage?chat_id=7174574119
Targets
-
-
Target
z91NUEVALISTADEPEDIDOSVENOKLERINTPDF.exe
-
Size
745KB
-
MD5
6fda43cabb3f068d38bc6bc1de5990b4
-
SHA1
d5e4f33e9957ac4bf91d757106708fb94f92d91d
-
SHA256
d5fc860d01e3c7e3a46a4cbb98f8c654e7533f4ecfb25218c00f4bac9061f6c8
-
SHA512
6a299357ce6d1d96661377c57b9279a5d31d26323c507f1a54a6a54cf57bd22fce3f91b5f7c6d6edb72999f6785b548f513f7460e8c99c672c01f85798fb7c26
-
SSDEEP
12288:ehkDgouVA2nxKkorvdRgQriDwOIxmxiZnYQE7PJcE4aCbVpGVln4:uRmJkcoQricOIQxiZY1iaCbAln4
-
Snake Keylogger payload
-
Snakekeylogger family
-
Downloads MZ/PE file
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-