General
-
Target
e-dekont.exe
-
Size
906KB
-
Sample
221103-jfabxaabaj
-
MD5
dea5ea4e9830ae8c67b096e21f011ee5
-
SHA1
cccd9a752bd4371808ed4f50fc40a69f9ceda0fd
-
SHA256
ca218e56143dfab73d7066f98227804de7098df11a79658794d00b5358f56f82
-
SHA512
7a4736667b0343fc185100d1c3341106751cccdbdadb27c38b894516bea5c15bc1a7a8a257b5331cca489a0648bfec0cfbc88f771a02b87dd7bf3b3ee4a769cc
-
SSDEEP
12288:L/3iutjRmmX88PnHlqpIbdoyXojwPNOihAGJcaGCBobE:L/RYk9EImyXoEPMihASGAobE
Static task
static1
Behavioral task
behavioral1
Sample
e-dekont.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e-dekont.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5587666659:AAG8NrrXJQs__dhk8nLJBFOspz2my8OVpX0/sendMessage?chat_id=5569775004
Targets
-
-
Target
e-dekont.exe
-
Size
906KB
-
MD5
dea5ea4e9830ae8c67b096e21f011ee5
-
SHA1
cccd9a752bd4371808ed4f50fc40a69f9ceda0fd
-
SHA256
ca218e56143dfab73d7066f98227804de7098df11a79658794d00b5358f56f82
-
SHA512
7a4736667b0343fc185100d1c3341106751cccdbdadb27c38b894516bea5c15bc1a7a8a257b5331cca489a0648bfec0cfbc88f771a02b87dd7bf3b3ee4a769cc
-
SSDEEP
12288:L/3iutjRmmX88PnHlqpIbdoyXojwPNOihAGJcaGCBobE:L/RYk9EImyXoEPMihASGAobE
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-