General

  • Target

    DEKONT_00011123_5600966797pdf.exe

  • Size

    83KB

  • Sample

    231103-jqzdsaea8x

  • MD5

    71c56c7c4b213fe43a0acea6467d58dd

  • SHA1

    2ea7d1641c51f94de578707f8b0759fb810697d2

  • SHA256

    da46c2f32055b74582d0ba99db21973c6e011ccbdba451ebf237f10e30401fe6

  • SHA512

    71823f522aaa498f14a9998c7c7fc6d46d528a673c6a65d25f33c96e9a5c7c207362aaed11004cce2f88c8d2021ac40cf5481fed5df08d6fb31e1dba6de4683d

  • SSDEEP

    1536:luTCfkB5q6KWvLB3UfurR960JOnLHqnYXdKk:f86furPD0LHqYXf

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6350529534:AAEbFW9VBWTKQfN1Y3K_5RJARCtOn1UqK8o/sendMessage?chat_id=1467583453

Targets

    • Target

      DEKONT_00011123_5600966797pdf.exe

    • Size

      83KB

    • MD5

      71c56c7c4b213fe43a0acea6467d58dd

    • SHA1

      2ea7d1641c51f94de578707f8b0759fb810697d2

    • SHA256

      da46c2f32055b74582d0ba99db21973c6e011ccbdba451ebf237f10e30401fe6

    • SHA512

      71823f522aaa498f14a9998c7c7fc6d46d528a673c6a65d25f33c96e9a5c7c207362aaed11004cce2f88c8d2021ac40cf5481fed5df08d6fb31e1dba6de4683d

    • SSDEEP

      1536:luTCfkB5q6KWvLB3UfurR960JOnLHqnYXdKk:f86furPD0LHqYXf

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks