General
-
Target
E-dekont.exe
-
Size
539KB
-
Sample
240925-sjf4assapj
-
MD5
061e9b5ea26b239521a584e4c6056536
-
SHA1
fcc6cedac0ea8cf78df6322236c49fa2796b4231
-
SHA256
5ad0166de70389aec0b9c399eaf4409626aee4a774538e5cc70264d8efdf9c75
-
SHA512
c5243309ded9a44cf9a580adf8d0090de3aae8eaa52b4435916fbac175215920c1048774bfda35f3a6a1da8dd3ca5ac1223ccda4acb203dd0c9fa75a1329d6c1
-
SSDEEP
6144:x6ej0DdEWMhO7ZiDBqOV2eR05OvC+kxMgC/bwFMwV9M1TjudvnKx9hOaa21uSTdp:x69EWKq6uezwzWGdvKvECmiYjgZ
Static task
static1
Behavioral task
behavioral1
Sample
E-dekont.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
E-dekont.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.emmioglu.com - Port:
587 - Username:
[email protected] - Password:
Kaya2758+
https://api.telegram.org/bot7601416878:AAHzH1jwUm0RRKH14oQQySe6mjhxYuRjdzQ/sendMessage?chat_id=6605246356
Targets
-
-
Target
E-dekont.exe
-
Size
539KB
-
MD5
061e9b5ea26b239521a584e4c6056536
-
SHA1
fcc6cedac0ea8cf78df6322236c49fa2796b4231
-
SHA256
5ad0166de70389aec0b9c399eaf4409626aee4a774538e5cc70264d8efdf9c75
-
SHA512
c5243309ded9a44cf9a580adf8d0090de3aae8eaa52b4435916fbac175215920c1048774bfda35f3a6a1da8dd3ca5ac1223ccda4acb203dd0c9fa75a1329d6c1
-
SSDEEP
6144:x6ej0DdEWMhO7ZiDBqOV2eR05OvC+kxMgC/bwFMwV9M1TjudvnKx9hOaa21uSTdp:x69EWKq6uezwzWGdvKvECmiYjgZ
-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-