General
-
Target
DEKONT-01.pdf.exe
-
Size
175KB
-
Sample
231108-pnwsrsbb2t
-
MD5
f5c32e3ed667969186412395e045db8c
-
SHA1
132274978970ca54c6849f89e931cc1386d2e6bc
-
SHA256
d7217211343721c3d6d51d07778a2d90910cf186ef457670dd396f90604afeed
-
SHA512
6b43eb5564d2ff660d2fae6c81097b66ea4ba4fef7e6f6a9f3f3adabf10d3248b2955aa93c6077778002f6aa4bcd181ffd69f37190be18320e0688902c10c208
-
SSDEEP
1536:LlZYKpARbL1uC6Ajba5V4euvvX32DEGu34HFnCxCeToYP8CIE3mWGjgfxscFCw9H:pusC6MzeuHbiGoDEnxscFCqg16aaWno
Static task
static1
Behavioral task
behavioral1
Sample
DEKONT-01.pdf.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
DEKONT-01.pdf.exe
Resource
win10v2004-20231020-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot6665362842:AAG0pFaR7HRKKztCR5GZinjteZ-4ePeXCWM/sendMessage?chat_id=1467583453
Targets
-
-
Target
DEKONT-01.pdf.exe
-
Size
175KB
-
MD5
f5c32e3ed667969186412395e045db8c
-
SHA1
132274978970ca54c6849f89e931cc1386d2e6bc
-
SHA256
d7217211343721c3d6d51d07778a2d90910cf186ef457670dd396f90604afeed
-
SHA512
6b43eb5564d2ff660d2fae6c81097b66ea4ba4fef7e6f6a9f3f3adabf10d3248b2955aa93c6077778002f6aa4bcd181ffd69f37190be18320e0688902c10c208
-
SSDEEP
1536:LlZYKpARbL1uC6Ajba5V4euvvX32DEGu34HFnCxCeToYP8CIE3mWGjgfxscFCw9H:pusC6MzeuHbiGoDEnxscFCqg16aaWno
-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-