General
-
Target
DEKONT S_659332597pdf.exe
-
Size
84KB
-
Sample
231101-hlx5gsea54
-
MD5
7704ab6ad00b8b76f7669f49cbb4c61c
-
SHA1
68ddf50320e14400d15786db01c63e2d9f7c57fc
-
SHA256
d00df0899a734a3446d165fdf7f18e43e40b85b3296eb0b00e1d1fa2bd8f9bc9
-
SHA512
95c9358b9624511a1997031e2b983123518513489e6d0e03eaedddaa5185a299902971d87913fe04144bcb320303fb8b7fa090285135bf91046602c6ed549302
-
SSDEEP
1536:NTS1f1IEYJ3EoNQoB1qmy5eEw8IufaDRVOP/pa7zgr:NTGNIvJQoBueJuIR8PhaYr
Static task
static1
Behavioral task
behavioral1
Sample
DEKONT S_659332597pdf.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
DEKONT S_659332597pdf.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot6350529534:AAEbFW9VBWTKQfN1Y3K_5RJARCtOn1UqK8o/sendMessage?chat_id=1467583453
Targets
-
-
Target
DEKONT S_659332597pdf.exe
-
Size
84KB
-
MD5
7704ab6ad00b8b76f7669f49cbb4c61c
-
SHA1
68ddf50320e14400d15786db01c63e2d9f7c57fc
-
SHA256
d00df0899a734a3446d165fdf7f18e43e40b85b3296eb0b00e1d1fa2bd8f9bc9
-
SHA512
95c9358b9624511a1997031e2b983123518513489e6d0e03eaedddaa5185a299902971d87913fe04144bcb320303fb8b7fa090285135bf91046602c6ed549302
-
SSDEEP
1536:NTS1f1IEYJ3EoNQoB1qmy5eEw8IufaDRVOP/pa7zgr:NTGNIvJQoBueJuIR8PhaYr
-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-