General
-
Target
854F1E97-5DBB-4A87-A566-33D9012B05E2 pdf.exe
-
Size
773KB
-
Sample
220930-qfls9seedp
-
MD5
4c0879ae07575bf47a534f7591fa31de
-
SHA1
36bf899720c14b0b6dfc7728bcf2f6a4befd7b13
-
SHA256
ee7e969904407f4e591c22b00ed91d1ed3f28c717e7075169d405dd157950bb4
-
SHA512
ec166c0f997ca8b850c34ff0605f10e9fa349d3cc811cebcdd50c92c83c020f2c2c73b8be4d66d49f35d74766f5e3081c55afeb2c196783e5a93467c7e6efbae
-
SSDEEP
12288:7To0l1k5gTusufEdIbfRGzAo3pnhbI11m7Iusl6XULJiNll3hYWnxEDv6DK:7TmKussEdITReAo3pnhE3usSzPhY2
Static task
static1
Behavioral task
behavioral1
Sample
854F1E97-5DBB-4A87-A566-33D9012B05E2 pdf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
854F1E97-5DBB-4A87-A566-33D9012B05E2 pdf.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5253212199:AAG-02qWN77aEjxlYTZ-WAZ7WOi_I4kCde8/sendMessage?chat_id=2128925974
Targets
-
-
Target
854F1E97-5DBB-4A87-A566-33D9012B05E2 pdf.exe
-
Size
773KB
-
MD5
4c0879ae07575bf47a534f7591fa31de
-
SHA1
36bf899720c14b0b6dfc7728bcf2f6a4befd7b13
-
SHA256
ee7e969904407f4e591c22b00ed91d1ed3f28c717e7075169d405dd157950bb4
-
SHA512
ec166c0f997ca8b850c34ff0605f10e9fa349d3cc811cebcdd50c92c83c020f2c2c73b8be4d66d49f35d74766f5e3081c55afeb2c196783e5a93467c7e6efbae
-
SSDEEP
12288:7To0l1k5gTusufEdIbfRGzAo3pnhbI11m7Iusl6XULJiNll3hYWnxEDv6DK:7TmKussEdITReAo3pnhE3usSzPhY2
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-