General
-
Target
04102024_1500_04102024_Enquiry_20240210000.pdf.z
-
Size
520KB
-
Sample
241004-sdps9avbkd
-
MD5
7bc5e475bb84e1142f280d4019033842
-
SHA1
0e708922188f0ed7911ef19780d4fa590b3fff95
-
SHA256
92c7039fc50117558741a51475f46a8318e3bf4c5cbe561b50a8312ec94ba5cb
-
SHA512
b4915ba99c49efb6b7d852f7443927d2641fd04ab4945f25b1e93a747e899c8d784f4e4070ee58d87b3fafd3166666458a80816d3e1848d883d8704d000d9dd0
-
SSDEEP
12288:OPDf1u5SXHcH60s6Q98SSqu6mnCqkZBLoWLmRbor2:Oz1u5S3cH6I3TRC/UWKpoC
Static task
static1
Behavioral task
behavioral1
Sample
Enquiry_20240210000.pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Enquiry_20240210000.pdf.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
juguly.shop - Port:
587 - Username:
[email protected] - Password:
d8GsruZs5Zg6 - Email To:
[email protected]
Targets
-
-
Target
Enquiry_20240210000.pdf.exe
-
Size
618KB
-
MD5
3ea0418567ac5a59f59094095df41e17
-
SHA1
1a18e0028289315358716b7ed440dd983c0b0458
-
SHA256
c3ba097fa559c09c855f8e4dfe8768c82d6d5005eadf4c4ea384b650ab54a06b
-
SHA512
a227caba779eb5fe8ffec665e3afc436d0eeb0d4fa8be84ef5e8a60b4b22ae7dbefad166ea23a1930a56a8c6a8a0cd516a7c3057ce2073c6018817f626b832b9
-
SSDEEP
12288:xXHmQWtBHPtkZB+W7WxY7HIkjJxppMbDkIvjUZKXf:BHm3tBlaBJ7g4HIklLIvjUZuf
-
Snake Keylogger payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-