General
-
Target
kduYCOzG3unrjuS.exe
-
Size
971KB
-
Sample
250214-j5m93aypav
-
MD5
d3a0ba21324645f871848f12087c22f8
-
SHA1
465af54531dbf6f506429c64ab89bebb217ca63e
-
SHA256
f74aa66c0a64b0bc95576d70551981e1d0e65de9662885cb4dde19e81bce76e2
-
SHA512
0e0c09f95b7bce088bbc0ccba42462c7812dad9a9becc92f4bba96e2d291c2fde4a99ee5bdda1ab56487439a1240da8ecd02db25f8a086730050d866deee3bc9
-
SSDEEP
24576:LQaHUIAwQ3L+TziY36qAMBiFbwH4yyzim0CY8iMo6bt:kaHUIAwS9GCuH4yyg8iMJ
Static task
static1
Behavioral task
behavioral1
Sample
kduYCOzG3unrjuS.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
kduYCOzG3unrjuS.exe
Resource
win10v2004-20250211-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot8146065464:AAFmO8RMLpJgd1BLjqm9MO8V-EzP0a6-JD4/sendMessage?chat_id=6306771742
Targets
-
-
Target
kduYCOzG3unrjuS.exe
-
Size
971KB
-
MD5
d3a0ba21324645f871848f12087c22f8
-
SHA1
465af54531dbf6f506429c64ab89bebb217ca63e
-
SHA256
f74aa66c0a64b0bc95576d70551981e1d0e65de9662885cb4dde19e81bce76e2
-
SHA512
0e0c09f95b7bce088bbc0ccba42462c7812dad9a9becc92f4bba96e2d291c2fde4a99ee5bdda1ab56487439a1240da8ecd02db25f8a086730050d866deee3bc9
-
SSDEEP
24576:LQaHUIAwQ3L+TziY36qAMBiFbwH4yyzim0CY8iMo6bt:kaHUIAwS9GCuH4yyg8iMJ
-
Snake Keylogger payload
-
Snakekeylogger family
-
Downloads MZ/PE file
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-