General
-
Target
DEKONT.exe
-
Size
949KB
-
Sample
240424-j29znafh71
-
MD5
384c4da2b75f4c7a1fa5585bc07634e6
-
SHA1
27d368536af080b92d543f9c24af8596cc0edd6d
-
SHA256
8980e6e2628b4103f4e3e0b01365a5e9a7df6e38c067c93633371c94b3d5dd34
-
SHA512
6b7919c2cb1a0900dad45b9d0a44aa7b7ff20a24cad142704978f3737f16ee5df0c3b9d2b1c5de05a0e565a9dfe591a82e7706eeda98c818d7a2840050f160b1
-
SSDEEP
12288:mF2iNryhiHr2JXAfykubkHwObkzi4pYv0lv312Z3:mF1lyhiHrAXAaXbkHwZ1qMJ312Z
Static task
static1
Behavioral task
behavioral1
Sample
DEKONT.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
DEKONT.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.agmfilter.com - Port:
587 - Username:
s.reyhani@agmfilter.com - Password:
sibelr_63017 - Email To:
draftreport@yahoo.com
https://scratchdreams.tk
Targets
-
-
Target
DEKONT.exe
-
Size
949KB
-
MD5
384c4da2b75f4c7a1fa5585bc07634e6
-
SHA1
27d368536af080b92d543f9c24af8596cc0edd6d
-
SHA256
8980e6e2628b4103f4e3e0b01365a5e9a7df6e38c067c93633371c94b3d5dd34
-
SHA512
6b7919c2cb1a0900dad45b9d0a44aa7b7ff20a24cad142704978f3737f16ee5df0c3b9d2b1c5de05a0e565a9dfe591a82e7706eeda98c818d7a2840050f160b1
-
SSDEEP
12288:mF2iNryhiHr2JXAfykubkHwObkzi4pYv0lv312Z3:mF1lyhiHrAXAaXbkHwZ1qMJ312Z
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-