General
-
Target
ProcessingIConnect.Common..TermsConditions.z.pdf.exe
-
Size
793KB
-
Sample
210201-dkkecj77vn
-
MD5
17f63f3534c4609b3412f0a258eb5788
-
SHA1
76bb799be2bf37a13f7b24c5c780887cec6a81d8
-
SHA256
ff97d75f4e260215c3894bad7ca8423b5d9bbda16d89e4b8b4aaf50c4c26d82a
-
SHA512
47ebd1f5e792b1cff28ab87a25dbe4145355f4412a6a8235d766ea03b39c616d112eae5b61c1ccdcd27cf7a05bd4b45ec51176841684de9e48179035f188bac8
Static task
static1
Behavioral task
behavioral1
Sample
ProcessingIConnect.Common..TermsConditions.z.pdf.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
ProcessingIConnect.Common..TermsConditions.z.pdf.exe
Resource
win10v20201028
Malware Config
Targets
-
-
Target
ProcessingIConnect.Common..TermsConditions.z.pdf.exe
-
Size
793KB
-
MD5
17f63f3534c4609b3412f0a258eb5788
-
SHA1
76bb799be2bf37a13f7b24c5c780887cec6a81d8
-
SHA256
ff97d75f4e260215c3894bad7ca8423b5d9bbda16d89e4b8b4aaf50c4c26d82a
-
SHA512
47ebd1f5e792b1cff28ab87a25dbe4145355f4412a6a8235d766ea03b39c616d112eae5b61c1ccdcd27cf7a05bd4b45ec51176841684de9e48179035f188bac8
Score10/10-
Snake Keylogger Payload
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-