General
-
Target
LAQ-PO088PDF.exe
-
Size
550KB
-
Sample
240625-qsx23awaql
-
MD5
93f4ebbd3bc337d1805105550286ebcb
-
SHA1
a5374ff40e11814b0b41398d88bbd8e9d0909012
-
SHA256
c8d4ad014bc77975ff52fc025abc76fdb1ea9676d453eb096a4b89d0529c58ad
-
SHA512
e924178dd1dbc9e12582f2f0abc69d30ceca85c8add2fd009e55641d89b641a63cd65198b57949981f4b4005cfc1ea24ba57b1627926aed83bbfcbc4b576d86b
-
SSDEEP
12288:Wz5wtNkLsikaU8HHB7QZ4GXUgKwzDxyq/HEnfp3bonqAE:OLsTziUnfYq/kfpd
Static task
static1
Behavioral task
behavioral1
Sample
LAQ-PO088PDF.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
LAQ-PO088PDF.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7301432976:AAH31iVg7cEj_CK4xnKcLgyVuIYziQoJStE/sendMessage?chat_id=1182519128
Targets
-
-
Target
LAQ-PO088PDF.exe
-
Size
550KB
-
MD5
93f4ebbd3bc337d1805105550286ebcb
-
SHA1
a5374ff40e11814b0b41398d88bbd8e9d0909012
-
SHA256
c8d4ad014bc77975ff52fc025abc76fdb1ea9676d453eb096a4b89d0529c58ad
-
SHA512
e924178dd1dbc9e12582f2f0abc69d30ceca85c8add2fd009e55641d89b641a63cd65198b57949981f4b4005cfc1ea24ba57b1627926aed83bbfcbc4b576d86b
-
SSDEEP
12288:Wz5wtNkLsikaU8HHB7QZ4GXUgKwzDxyq/HEnfp3bonqAE:OLsTziUnfYq/kfpd
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-