General
-
Target
12102023_1210_11102023_Hesap hareketleriniz pdf.gz
-
Size
17KB
-
Sample
231012-eq7ypsdh8v
-
MD5
b2691e370f9e9ed7cffb240898ca7d52
-
SHA1
a4c7be14f3dc747a3a2f44e36eb0a81e06e05629
-
SHA256
40121dab1b7d4c35bf611f6dcd58bc55c73823b6eaa06cf6323803117006887e
-
SHA512
c65e8e89a0dcef783e5fb19a8e55554619780f1334e9e733ad30c16a54c0ac3223d58f9ae8f4e60d1765238ad61d9d6bbc4604c70fbdcb94275f64d8e00a8832
-
SSDEEP
384:jrdlu8we/yJVqgkgOI6+oSWP9VDAflPrvFqXSc3BVT0I2Q:jrbknqgkgbhoNcVNqXSwF
Static task
static1
Behavioral task
behavioral1
Sample
Fnjnpedy.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Fnjnpedy.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot6675876060:AAEydIMROdr0XsdBN7fk_mjJRQvyv_ectv4/sendMessage?chat_id=5262627523
Targets
-
-
Target
Fnjnpedy.exe
-
Size
32KB
-
MD5
61a347aa80bae20fc5908ae86f8790ad
-
SHA1
2163cacdcb0b91e2a4c4cb2e2e021d6148961854
-
SHA256
41ccb4c165200571b2d10047d7e25c85e7a270c2bb6c3438c7f8edce7dc2fc9c
-
SHA512
e1cfd42004c0c1c32af49632769ba84dd93c128e210ced9f47fffbbd3f1324885e4d830b90432c83082c17c44ada91878c33585bdd5cb27c3b47486ae9ecd30c
-
SSDEEP
384:LzsL/CyUCVnCMr2jEKqv++7Jk+qY/sgKwLF12APL6yRqtxAx+roEOPVK/KO+zB6a:aUCVCMrJJd5pRKs3RqtGx+roLYP+ka
-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-