General
-
Target
dekont_001.pdf.exe
-
Size
6KB
-
Sample
241025-x46xns1kek
-
MD5
e8988ad104148396f3bbc969c3e84a94
-
SHA1
b2f862133633e4dd69debb0d12c926c7cfbfa29f
-
SHA256
e83231fa6c8d4df75581b44faa0180bc822f28168e12ed7590ba8c06a879a55e
-
SHA512
d736e729e6ea1b7d2a28bbb4da40b3b1202cfaed35ed0cfc883f249d8d61f9b89534fabb26ca27595c140bdb72131622aab4d5f3e12fed67eebc67a76282852e
-
SSDEEP
96:ItlJkasxKUdSgvFKruk4Z50q1NjY2CMOt50vplejzNt:Fx5SgvFG4HtjY2omvLel
Static task
static1
Behavioral task
behavioral1
Sample
dekont_001.pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dekont_001.pdf.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7936689263:AAFVbTtCpguyJIaEvOdJBx9Oj9n157mQOMA/sendMessage?chat_id=6008123474
Targets
-
-
Target
dekont_001.pdf.exe
-
Size
6KB
-
MD5
e8988ad104148396f3bbc969c3e84a94
-
SHA1
b2f862133633e4dd69debb0d12c926c7cfbfa29f
-
SHA256
e83231fa6c8d4df75581b44faa0180bc822f28168e12ed7590ba8c06a879a55e
-
SHA512
d736e729e6ea1b7d2a28bbb4da40b3b1202cfaed35ed0cfc883f249d8d61f9b89534fabb26ca27595c140bdb72131622aab4d5f3e12fed67eebc67a76282852e
-
SSDEEP
96:ItlJkasxKUdSgvFKruk4Z50q1NjY2CMOt50vplejzNt:Fx5SgvFG4HtjY2omvLel
Score10/10-
Snake Keylogger payload
-
Snakekeylogger family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Drops startup file
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-