General
-
Target
e3e8544ef8ebfa6c4e2bad232e9a36e6d875c76db821e3510b3fb5d663b52f57.exe
-
Size
1.0MB
-
Sample
250326-vpgccs1nv2
-
MD5
3539d70135423551c66d9ab3133f19cb
-
SHA1
36c89584ff8991c4db3f79b0452b737947035bed
-
SHA256
e3e8544ef8ebfa6c4e2bad232e9a36e6d875c76db821e3510b3fb5d663b52f57
-
SHA512
212393c56ecb08caae86d121134cb18316f01c65a0fd0a48ae6fdef77920547551f3e93b786dff00505969e2577afb25341f1345f9132ade6795d99324f520e4
-
SSDEEP
24576:CA9km6k/IwRYbiBeKGCpLcnFUSK2XXDaXBYGY4:z9sk/IRUnkySKszaq14
Static task
static1
Behavioral task
behavioral1
Sample
e3e8544ef8ebfa6c4e2bad232e9a36e6d875c76db821e3510b3fb5d663b52f57.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
e3e8544ef8ebfa6c4e2bad232e9a36e6d875c76db821e3510b3fb5d663b52f57.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7832018288:AAF-gH2mdBfmXAJSuO5ww7UMKYuYCSKeFDA/sendMessage?chat_id=5007084465
Targets
-
-
Target
e3e8544ef8ebfa6c4e2bad232e9a36e6d875c76db821e3510b3fb5d663b52f57.exe
-
Size
1.0MB
-
MD5
3539d70135423551c66d9ab3133f19cb
-
SHA1
36c89584ff8991c4db3f79b0452b737947035bed
-
SHA256
e3e8544ef8ebfa6c4e2bad232e9a36e6d875c76db821e3510b3fb5d663b52f57
-
SHA512
212393c56ecb08caae86d121134cb18316f01c65a0fd0a48ae6fdef77920547551f3e93b786dff00505969e2577afb25341f1345f9132ade6795d99324f520e4
-
SSDEEP
24576:CA9km6k/IwRYbiBeKGCpLcnFUSK2XXDaXBYGY4:z9sk/IRUnkySKszaq14
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-