General
-
Target
854F1E97-5DBB-4A87-A566-33D9210B50E2 pdf.exe
-
Size
803KB
-
Sample
221003-qndgvshbdk
-
MD5
235906f532358c66aedc8af2fcb5845a
-
SHA1
05747a0d86096a2d6a4118ad60301c984d5a9201
-
SHA256
a0ff4d380791e0a1c27881e8b5e817dce2b57a5ea40ab577bce81bd43682c88a
-
SHA512
d3fa854aa2ebc243891878ad762c3253b7c4fda11891b75f26759cda8618235e3799f569ac33052e0e1b6e4783b39ff66949d00cf4a324e5e757b0224847a569
-
SSDEEP
12288:oK4HTN7kOmge//hFxgLqPADPg3WKNyErFzK3C9DtbMA/df:okxgcjkP9b3C1KWdf
Static task
static1
Behavioral task
behavioral1
Sample
854F1E97-5DBB-4A87-A566-33D9210B50E2 pdf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
854F1E97-5DBB-4A87-A566-33D9210B50E2 pdf.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5503630831:AAGYIuw8LrLVvQb1hO8ZqTSsce27HhMrEKM/sendMessage?chat_id=1467583453
Targets
-
-
Target
854F1E97-5DBB-4A87-A566-33D9210B50E2 pdf.exe
-
Size
803KB
-
MD5
235906f532358c66aedc8af2fcb5845a
-
SHA1
05747a0d86096a2d6a4118ad60301c984d5a9201
-
SHA256
a0ff4d380791e0a1c27881e8b5e817dce2b57a5ea40ab577bce81bd43682c88a
-
SHA512
d3fa854aa2ebc243891878ad762c3253b7c4fda11891b75f26759cda8618235e3799f569ac33052e0e1b6e4783b39ff66949d00cf4a324e5e757b0224847a569
-
SSDEEP
12288:oK4HTN7kOmge//hFxgLqPADPg3WKNyErFzK3C9DtbMA/df:okxgcjkP9b3C1KWdf
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-