General
-
Target
CMSAGEInvoice8March2025sign.exe
-
Size
1.0MB
-
Sample
250414-hern5a1jy8
-
MD5
70b411c7aa1753649f16bf40ff715e15
-
SHA1
25164d02b05a3d22a63e47ab09fd8f5c96650a8c
-
SHA256
4723dee89c57a6cd8008358779826bfb0a6385f40dd852ad1bbba3e5e6d6758c
-
SHA512
722116926312bb80a85eda1af64876dff2802f4d29e3a2d5b1f7366076c8d0d8137cb4bdb29282b95a731a3b160ba0fec3ecc701cd802e3758c592b253086851
-
SSDEEP
24576:QG8tBFBiemT0AxlhvMh85j+nJuhUwY+s6iA4GuaJjt8c:TeHixKyjIJuJ26Idc
Static task
static1
Behavioral task
behavioral1
Sample
CMSAGEInvoice8March2025sign.exe
Resource
win10v2004-20250410-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7694680589:AAH7v3RVHta216sxEJEjKVfvPtJtbLd9qY0/sendMessage?chat_id=7987531671
Targets
-
-
Target
CMSAGEInvoice8March2025sign.exe
-
Size
1.0MB
-
MD5
70b411c7aa1753649f16bf40ff715e15
-
SHA1
25164d02b05a3d22a63e47ab09fd8f5c96650a8c
-
SHA256
4723dee89c57a6cd8008358779826bfb0a6385f40dd852ad1bbba3e5e6d6758c
-
SHA512
722116926312bb80a85eda1af64876dff2802f4d29e3a2d5b1f7366076c8d0d8137cb4bdb29282b95a731a3b160ba0fec3ecc701cd802e3758c592b253086851
-
SSDEEP
24576:QG8tBFBiemT0AxlhvMh85j+nJuhUwY+s6iA4GuaJjt8c:TeHixKyjIJuJ26Idc
Score10/10-
Snake Keylogger payload
-
Snakekeylogger family
-
Blocklisted process makes network request
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-