General
-
Target
9f0621c4cf15fa307280544219cc5ec4a18385aabb987e4ae24fb3d242f4636c.exe
-
Size
952KB
-
Sample
250219-fphsvsxphr
-
MD5
15e2ffa4a2f8b42d5c133d26fac916d2
-
SHA1
daab3c2bc5e78e8b09223129f267a302565063a1
-
SHA256
9f0621c4cf15fa307280544219cc5ec4a18385aabb987e4ae24fb3d242f4636c
-
SHA512
aa9acef205ae1b9191ea99144b13de280c3a951f99850a82f5a7034e4fc6ee93cd3f2e6f56a7d395dc546c71fddfe5104c3e379b96aa4de1050042a7b5b4b585
-
SSDEEP
24576:vu6J33O0c+JY5UZ+XC0kGso6FaPPKe8QWY:Zu0c++OCvkGs9FaPyY
Static task
static1
Behavioral task
behavioral1
Sample
9f0621c4cf15fa307280544219cc5ec4a18385aabb987e4ae24fb3d242f4636c.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
9f0621c4cf15fa307280544219cc5ec4a18385aabb987e4ae24fb3d242f4636c.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot8123813718:AAE7xhJKgiVtPaoPZCfcx9AxRJoEs0MjRtc/sendMessage?chat_id=7607163233
Targets
-
-
Target
9f0621c4cf15fa307280544219cc5ec4a18385aabb987e4ae24fb3d242f4636c.exe
-
Size
952KB
-
MD5
15e2ffa4a2f8b42d5c133d26fac916d2
-
SHA1
daab3c2bc5e78e8b09223129f267a302565063a1
-
SHA256
9f0621c4cf15fa307280544219cc5ec4a18385aabb987e4ae24fb3d242f4636c
-
SHA512
aa9acef205ae1b9191ea99144b13de280c3a951f99850a82f5a7034e4fc6ee93cd3f2e6f56a7d395dc546c71fddfe5104c3e379b96aa4de1050042a7b5b4b585
-
SSDEEP
24576:vu6J33O0c+JY5UZ+XC0kGso6FaPPKe8QWY:Zu0c++OCvkGs9FaPyY
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-