General
-
Target
Items IMG16092024.pdf.exe
-
Size
957KB
-
Sample
240924-q89qssxfkp
-
MD5
e24b9ef302a36051801a4d27e5563350
-
SHA1
f7ca82fcd4fc8d02f6135ee4da09e3d0277421f0
-
SHA256
337f2438ac48410b788b27c4d5a3668b67f1a7d5c1eb3d1c614dfd1652b5a42d
-
SHA512
5ebae13b999767baaa6ba52792b8da9e66c814911fe147a90b0e6b4b072533ca12f5447a40bb4832278c381e584223f4ad5dc5bdf8f3c656bf7e7451d7500ffe
-
SSDEEP
24576:jL7opqubED/7h4y9VATErHoJUG79VkxxKIR5e:rkFahvJrR290
Static task
static1
Behavioral task
behavioral1
Sample
Items IMG16092024.pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Items IMG16092024.pdf.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7444558447:AAHNIAHnG1YJbhdGtivj0iiHR8ECCeZ9fo4/sendMessage?chat_id=6981201194
Targets
-
-
Target
Items IMG16092024.pdf.exe
-
Size
957KB
-
MD5
e24b9ef302a36051801a4d27e5563350
-
SHA1
f7ca82fcd4fc8d02f6135ee4da09e3d0277421f0
-
SHA256
337f2438ac48410b788b27c4d5a3668b67f1a7d5c1eb3d1c614dfd1652b5a42d
-
SHA512
5ebae13b999767baaa6ba52792b8da9e66c814911fe147a90b0e6b4b072533ca12f5447a40bb4832278c381e584223f4ad5dc5bdf8f3c656bf7e7451d7500ffe
-
SSDEEP
24576:jL7opqubED/7h4y9VATErHoJUG79VkxxKIR5e:rkFahvJrR290
-
Snake Keylogger payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-