General
-
Target
e2eb6ae5ae0c59c2c20cded55d33293fc3a88431312ace0a943ae074991ff1d5
-
Size
1.4MB
-
Sample
241004-khs3gaycpe
-
MD5
6d5807bd598382564ee08e4e6f3d158a
-
SHA1
8830b8fa46873a4fab26e490e98b3df54c78d7a7
-
SHA256
e2eb6ae5ae0c59c2c20cded55d33293fc3a88431312ace0a943ae074991ff1d5
-
SHA512
81cecd449474982284744350ed87c44b6e5a4ceec697cb191db032251a1eebddf2ff83b1e528076b3eae26970e33569ca6c08af4ceac754407010d74a06a04e2
-
SSDEEP
24576:mIi2NctPvgQ5Zt52JcWkiKL9ZaP2cTxN6diDi5fR458rIRtjrUDL14+WLy94a:mPKctPYVtXqZ1cT76d/9e58rI3oDLW+z
Static task
static1
Behavioral task
behavioral1
Sample
PROFORMA FATURA pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PROFORMA FATURA pdf.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7763642353:AAFJAT5gGdyzAPlr52ZFpaxd8BnWyDl4dX8/sendMessage?chat_id=6012493587
Targets
-
-
Target
PROFORMA FATURA pdf.exe
-
Size
2.3MB
-
MD5
a30e9b58b16c609e63db086c39fc5c83
-
SHA1
c4d0933d90088ba673e17bcff3efd52dace7e8df
-
SHA256
f278e9e47422ea40eda7002194f17872643ab88366e84124813f161b28be9c09
-
SHA512
2a1bdda4e3c2ad2ad312acd87d16f4ccf9dc6ce3b50941d1771ef53786da9f91c71629096c3403b7b48cdb9ad215facf958a1353c5f0380b846987c9da90ea7b
-
SSDEEP
49152:tDCNmXVrxzzilHH+/EZvwN/Idbze5QYpiDLT+s:qHH+cZvPd/ew
-
Snake Keylogger payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-