General
-
Target
Shipping Documents.pdf.exe
-
Size
704KB
-
Sample
230515-p6xssafd96
-
MD5
903734f7c57dc9f7de2e10c8efdddb44
-
SHA1
c4942900cb85153d90371e52398d42e4e715b756
-
SHA256
82a5ab20cca30fb6373b256808762ba3fe16ea61c36ccaa60d676c171f6741f6
-
SHA512
21cced8ccdbb367cd4e4c54364dbe7e7f9d1c5010b29772a7cd2df8cc81d5ffd448bb93bb5715fbc70b8c276a6340d36e543b306d59b52f082ca6faa08ab41bc
-
SSDEEP
12288:t4ZfTp7kxmYcuENSNi3UT8kI5FRTcMAHNOzE+v07NCRB4:tmLNGAXNSiUT8ffnr07
Static task
static1
Behavioral task
behavioral1
Sample
Shipping Documents.pdf.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Shipping Documents.pdf.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot6029559841:AAEqr8_NCfqapJgAzw8PoPbqoCosnsk1VO0/sendMessage?chat_id=6033043077
Targets
-
-
Target
Shipping Documents.pdf.exe
-
Size
704KB
-
MD5
903734f7c57dc9f7de2e10c8efdddb44
-
SHA1
c4942900cb85153d90371e52398d42e4e715b756
-
SHA256
82a5ab20cca30fb6373b256808762ba3fe16ea61c36ccaa60d676c171f6741f6
-
SHA512
21cced8ccdbb367cd4e4c54364dbe7e7f9d1c5010b29772a7cd2df8cc81d5ffd448bb93bb5715fbc70b8c276a6340d36e543b306d59b52f082ca6faa08ab41bc
-
SSDEEP
12288:t4ZfTp7kxmYcuENSNi3UT8kI5FRTcMAHNOzE+v07NCRB4:tmLNGAXNSiUT8ffnr07
-
Snake Keylogger payload
-
StormKitty payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-