General
-
Target
e2ce18dc2989ae7bf96190b29e375637f530e55e4e20705bf5ee2b4677813aaa
-
Size
526KB
-
Sample
250214-tabb5atjey
-
MD5
6b709debce80248c965c9673c216ef55
-
SHA1
82a9d9f97455a564c3a81f51a0f49f5a43c6159e
-
SHA256
e2ce18dc2989ae7bf96190b29e375637f530e55e4e20705bf5ee2b4677813aaa
-
SHA512
1bae3fb591a6e38e96df1edf79489bbc8b406acd2610e6ae176914255b5a11324bb52ab1d704e800c7433c0e01589d17704f9f4ef5cace302b1cdb94617a2fd7
-
SSDEEP
12288:H2GIxsEW62PBlMkQqX/AKU4zvRfaF+mevMuH1dA720IPoU0:H2GIxo6krvjUmRfaF+mevM8bATIAh
Static task
static1
Behavioral task
behavioral1
Sample
Nuevo pedido N. Z21239.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Nuevo pedido N. Z21239.exe
Resource
win10v2004-20250211-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7920003586:AAHBMriHaNCFiZ4OQ4NdecriTbdf93HSOJo/sendMessage?chat_id=7174574119
Targets
-
-
Target
Nuevo pedido N. Z21239.exe
-
Size
943KB
-
MD5
b0f8780c47cb2f1dbfff0746f71124a7
-
SHA1
d891f8246efb54f7020b39c0787f1fc656326ac7
-
SHA256
a033bd54a83b5d3e5734514f69120d9ef835533ae0a64aea48d98f3bccb42be4
-
SHA512
b0ff180cc232f86c55085adf7553b9d5777326dcaf54e766b2efd060886be05457f0d282019fe6168674c33c55189f221f7753f9f7e2b7f12ce3fbf73a8327ca
-
SSDEEP
24576:Ou6J33O0c+JY5UZ+XC0kGso6FatAAbS51WY:Au0c++OCvkGs9FatcuY
-
Snake Keylogger payload
-
Snakekeylogger family
-
Downloads MZ/PE file
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-