General
-
Target
Pdznjmwmori.exe
-
Size
23KB
-
Sample
230929-kpavgagg9v
-
MD5
7fe389096fa318c3f3cb73fcf58973ea
-
SHA1
61b3c643ffcf012bcb8f850a654af71eef6b2748
-
SHA256
69ee82a6768795d07d99bfa267bf0ecfdde55651ba756338c448b0735db3f59e
-
SHA512
d84202c2a7ca3f611737b88054adbe3fa841d55ad6baa498f9bc262a57cf3751fb1c9705457fd5b78934ad22694c793fb925f9e2a3f1576c77eb8bd26ff48dd3
-
SSDEEP
384:JkvLCxRRfB5bGvdGsynUXkOaXYs1dFFq88afXpBC88aHXpK:2vLCTRpFZHf7JfXfRHXE
Static task
static1
Behavioral task
behavioral1
Sample
Pdznjmwmori.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Pdznjmwmori.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot6563963046:AAGlyBHZ_ALQCHnOUZcYa0FHqP2za43gVaM/sendMessage?chat_id=5262627523
Targets
-
-
Target
Pdznjmwmori.exe
-
Size
23KB
-
MD5
7fe389096fa318c3f3cb73fcf58973ea
-
SHA1
61b3c643ffcf012bcb8f850a654af71eef6b2748
-
SHA256
69ee82a6768795d07d99bfa267bf0ecfdde55651ba756338c448b0735db3f59e
-
SHA512
d84202c2a7ca3f611737b88054adbe3fa841d55ad6baa498f9bc262a57cf3751fb1c9705457fd5b78934ad22694c793fb925f9e2a3f1576c77eb8bd26ff48dd3
-
SSDEEP
384:JkvLCxRRfB5bGvdGsynUXkOaXYs1dFFq88afXpBC88aHXpK:2vLCTRpFZHf7JfXfRHXE
-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-