General
-
Target
DEKONT_00011123_5600966797pdf.exe
-
Size
83KB
-
Sample
231103-jqzdsaea8x
-
MD5
71c56c7c4b213fe43a0acea6467d58dd
-
SHA1
2ea7d1641c51f94de578707f8b0759fb810697d2
-
SHA256
da46c2f32055b74582d0ba99db21973c6e011ccbdba451ebf237f10e30401fe6
-
SHA512
71823f522aaa498f14a9998c7c7fc6d46d528a673c6a65d25f33c96e9a5c7c207362aaed11004cce2f88c8d2021ac40cf5481fed5df08d6fb31e1dba6de4683d
-
SSDEEP
1536:luTCfkB5q6KWvLB3UfurR960JOnLHqnYXdKk:f86furPD0LHqYXf
Static task
static1
Behavioral task
behavioral1
Sample
DEKONT_00011123_5600966797pdf.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
DEKONT_00011123_5600966797pdf.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot6350529534:AAEbFW9VBWTKQfN1Y3K_5RJARCtOn1UqK8o/sendMessage?chat_id=1467583453
Targets
-
-
Target
DEKONT_00011123_5600966797pdf.exe
-
Size
83KB
-
MD5
71c56c7c4b213fe43a0acea6467d58dd
-
SHA1
2ea7d1641c51f94de578707f8b0759fb810697d2
-
SHA256
da46c2f32055b74582d0ba99db21973c6e011ccbdba451ebf237f10e30401fe6
-
SHA512
71823f522aaa498f14a9998c7c7fc6d46d528a673c6a65d25f33c96e9a5c7c207362aaed11004cce2f88c8d2021ac40cf5481fed5df08d6fb31e1dba6de4683d
-
SSDEEP
1536:luTCfkB5q6KWvLB3UfurR960JOnLHqnYXdKk:f86furPD0LHqYXf
-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-