General
-
Target
36A4CE95-45C2-4059-8975-9F3BA8325548.pdf.z
-
Size
583KB
-
Sample
241022-rje1kayfle
-
MD5
26dfc0875f5f0243beb3942bd5f62f7e
-
SHA1
06872aea006af18e3f3cff17fef3886969d321a3
-
SHA256
5f55b5beeb4271d51ae0ee7539dee244bece4e8846e5bb68002816052b3e3870
-
SHA512
a4eda1a37860cc7b2d3b1cd9097a62f5e720621455d48295831c24a56fa86e5b15d1b5cca1807af110fcede3b7b19d855364b2bb1e43819aa411913f7212d2db
-
SSDEEP
12288:EIC+j2Ak0bzil1W6lWxkORBY23aoB0j4dYCBfJTMuJ4lZsT/PuFWxYA+c+E:zxFk0fil/IxkOd3a4dDijZsDPu8xac/
Static task
static1
Behavioral task
behavioral1
Sample
36A4CE95-45C2-4059-8975-9F3BA8325548.pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
36A4CE95-45C2-4059-8975-9F3BA8325548.pdf.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7754092182:AAFhYG1ixwJ3gbkMI8P9ofyeJ8nQ3W5NoAU/sendMessage?chat_id=6008123474
Targets
-
-
Target
36A4CE95-45C2-4059-8975-9F3BA8325548.pdf.exe
-
Size
922KB
-
MD5
27e278b3f081e2912b69eafe4e67d551
-
SHA1
a003df37c0d214dba9bbc8b041852354a43e00d7
-
SHA256
c9c4df8ccf2d7149cf5c6ad5e630e5b8385ba3e8ec6d3cbf31d362abb57671b5
-
SHA512
b912042baa589c99ee1f424b6c8e199ef9fe69f5678b0e40aed0e9820cce6d06364cfd51248a30a373d5c49198390d8e98cdd7e389ff8672d618f3b77ae60924
-
SSDEEP
12288:dLkcoxg7v3qnC11ErwIhh0F4qwUgUny5QWmqzbe7cJN+yt1AyPD2BRax2S:hfmMv6Ckr7Mny5QWmkC4JozkyB4x2S
-
Snake Keylogger payload
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-