General
-
Target
df0d61eb19b8a191a145972c6398fbd388b52b00acf9dd24dd07627a02f5036c
-
Size
524KB
-
Sample
250219-mcb8wayqgp
-
MD5
b97915ac30ad6bcc563eea808ed56596
-
SHA1
36a2bddc4a109a601ad726f1d75bd1bc867b166e
-
SHA256
df0d61eb19b8a191a145972c6398fbd388b52b00acf9dd24dd07627a02f5036c
-
SHA512
cec1d41f49ad4472ea15d65ca7dc76800c35544300aae1aa153c2f9962ed378806394e7bf4e8adf3c0e4bd8cc21f95e2ba73d4b2aea13bc54698c9b733a1409c
-
SSDEEP
12288:BA4F1zc5m+ecdDDSvqcfrN0+Y6rKbuGwSus7Xhj7weV4ww:p3zYmLMDZMrqvbu5oZ7b+n
Static task
static1
Behavioral task
behavioral1
Sample
Updated Price List.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Updated Price List.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7572469755:AAHCBLe3bEv-r8VSlR3NztVSSHz6JBpCC7s/sendMessage?chat_id=7207594974
Targets
-
-
Target
Updated Price List.exe
-
Size
909KB
-
MD5
48303a0f6cf86a64328acc545192bff0
-
SHA1
2c9973e30e9697c5c8b6a91ecb3fbc8b05c3b455
-
SHA256
dcb42b8ad4e7cc40fe12cfef0f5b97fba6073716a6315784ed6dd8847a51e86d
-
SHA512
f54afc180d0d1bf6ce4ddaa8ea04a1c2281390a8bc102b2b5e52d6bed2083932af1e0862a7d498695cde64a939d5704d2e48766c4b72fab76c8321cd8ac36891
-
SSDEEP
12288:m3ks0DMw9q5M3FYOc+s7LbcwH8YiSFDw5:m3ksxw9rYO6Pcwcaw
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-