General
-
Target
Dekont_2023050124093516589076505.doc.exe
-
Size
525KB
-
Sample
230513-gwgd2shh2w
-
MD5
5fada9cc420b6a9c86f55771b427d72b
-
SHA1
5adbaa94df818949a756afcec3fa995ad50bf502
-
SHA256
0aad2d2a4c8c2af74ce2276ea7cbf258755215fa6ca830c9d71c42fb56e3a328
-
SHA512
04477e4f96bd1e76d3d5dfbb6fe1b03c416e73403a449af7e1fd6904b762b66611978bb76dcfa4bd8b36c736723d338c0d2d8aa65f4e36f82e8a7089e096d8f0
-
SSDEEP
12288:V98whh2Y4Yp8g34bCK49zrT9zU5B9O4I4e2slmYMfxFa3O4XidvlPqhTad:L8whh2s8goWDrT9o5B9EBLMfXeyFM5a
Static task
static1
Behavioral task
behavioral1
Sample
Dekont_2023050124093516589076505.doc.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Dekont_2023050124093516589076505.doc.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5843567515:AAEdtJWwcJKNn64U81CKVdG-li_Ejds8raM/sendMessage?chat_id=1639214896
Targets
-
-
Target
Dekont_2023050124093516589076505.doc.exe
-
Size
525KB
-
MD5
5fada9cc420b6a9c86f55771b427d72b
-
SHA1
5adbaa94df818949a756afcec3fa995ad50bf502
-
SHA256
0aad2d2a4c8c2af74ce2276ea7cbf258755215fa6ca830c9d71c42fb56e3a328
-
SHA512
04477e4f96bd1e76d3d5dfbb6fe1b03c416e73403a449af7e1fd6904b762b66611978bb76dcfa4bd8b36c736723d338c0d2d8aa65f4e36f82e8a7089e096d8f0
-
SSDEEP
12288:V98whh2Y4Yp8g34bCK49zrT9zU5B9O4I4e2slmYMfxFa3O4XidvlPqhTad:L8whh2s8goWDrT9o5B9EBLMfXeyFM5a
-
Snake Keylogger payload
-
StormKitty payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-