General
-
Target
Dekont.pdf.exe
-
Size
1.0MB
-
Sample
230309-qb37racd98
-
MD5
67094c96aaf5c057e57a2e709fa7fc89
-
SHA1
11798292f663a7c3313542dffe21cbb0ecab3c6f
-
SHA256
ecadf3a82456432d82fb7e6ce72761aa85253bff9e17d6ae25566132620a280c
-
SHA512
687d3a08ba45055f29ec03ef6b66edc61623bc1c7e1e710762fc9ceeedcbf03debf6f726fada18e0fe4a0e8a3f9fa6bcad9363c1921a49580cad065e5ca581e3
-
SSDEEP
24576:NuOZ6wGkB+e9uf8mSR+aK7CZdWrlB7YDCpoj0O:UA1ICakqoj0O
Static task
static1
Behavioral task
behavioral1
Sample
Dekont.pdf.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Dekont.pdf.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5253212199:AAG-02qWN77aEjxlYTZ-WAZ7WOi_I4kCde8/sendMessage?chat_id=2128925974
Targets
-
-
Target
Dekont.pdf.exe
-
Size
1.0MB
-
MD5
67094c96aaf5c057e57a2e709fa7fc89
-
SHA1
11798292f663a7c3313542dffe21cbb0ecab3c6f
-
SHA256
ecadf3a82456432d82fb7e6ce72761aa85253bff9e17d6ae25566132620a280c
-
SHA512
687d3a08ba45055f29ec03ef6b66edc61623bc1c7e1e710762fc9ceeedcbf03debf6f726fada18e0fe4a0e8a3f9fa6bcad9363c1921a49580cad065e5ca581e3
-
SSDEEP
24576:NuOZ6wGkB+e9uf8mSR+aK7CZdWrlB7YDCpoj0O:UA1ICakqoj0O
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-