General
-
Target
fe7421156cc8170d04f7d03d2cd90ffc7fc544247502ea38f52b5437f9a99949.exe
-
Size
960KB
-
Sample
250219-gxprtayrcx
-
MD5
2852113f5b55c647892bcd338f1f83d9
-
SHA1
cc1d9cb3859fa41935b4e50bc3fe3ef28166d981
-
SHA256
fe7421156cc8170d04f7d03d2cd90ffc7fc544247502ea38f52b5437f9a99949
-
SHA512
fec40e41a531efee64bd9af9efd6080a21c5a33d49fc5789709e1038c5a11f9f41045386c9f89310ba4d0c4eb98038be323a815011e65325b3a37e990c21226e
-
SSDEEP
24576:Wu6J33O0c+JY5UZ+XC0kGso6FaPrJ3ayXWY:4u0c++OCvkGs9FaPwVY
Static task
static1
Behavioral task
behavioral1
Sample
fe7421156cc8170d04f7d03d2cd90ffc7fc544247502ea38f52b5437f9a99949.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe7421156cc8170d04f7d03d2cd90ffc7fc544247502ea38f52b5437f9a99949.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7933970075:AAH-phqF2Nqha9N-SqH71iAqVTOYva6GRpE/sendMessage?chat_id=6557702940
Targets
-
-
Target
fe7421156cc8170d04f7d03d2cd90ffc7fc544247502ea38f52b5437f9a99949.exe
-
Size
960KB
-
MD5
2852113f5b55c647892bcd338f1f83d9
-
SHA1
cc1d9cb3859fa41935b4e50bc3fe3ef28166d981
-
SHA256
fe7421156cc8170d04f7d03d2cd90ffc7fc544247502ea38f52b5437f9a99949
-
SHA512
fec40e41a531efee64bd9af9efd6080a21c5a33d49fc5789709e1038c5a11f9f41045386c9f89310ba4d0c4eb98038be323a815011e65325b3a37e990c21226e
-
SSDEEP
24576:Wu6J33O0c+JY5UZ+XC0kGso6FaPrJ3ayXWY:4u0c++OCvkGs9FaPwVY
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-