General
-
Target
dekont_001.pdf.z
-
Size
35KB
-
Sample
241028-pcfx6swqhx
-
MD5
ac08485c15ce644e92948008f70146fa
-
SHA1
3a05e30f12deaedb1ac1550c08d2bad01228a7dd
-
SHA256
ec9a9ab95cb6cbb2b4b47bade918dda482d919f9d80613f6efd23bcfdf36e484
-
SHA512
92f00fafaa498f85059d9c01cb28503060f0026c0bd3db82ba316c93dd6dc31ba7b12db5754f67be21696dee082119ea7ac6a918d5ef006bc3fa20e9d6b8a5c1
-
SSDEEP
768:zghOxz89WSHf93rW3/KXJEgYSiQe78tRdyIVBZjMhZngMCfRW008:zghkzaWwNrGCXSvz7MyuBMf3AW6
Static task
static1
Behavioral task
behavioral1
Sample
dekont_001.pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dekont_001.pdf.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot8007960326:AAFswhlAovIYra6y-Z3vk6uZa4lj11jIino/sendMessage?chat_id=6008123474
Targets
-
-
Target
dekont_001.pdf.exe
-
Size
74KB
-
MD5
d998da7be623b6299e9257fcf5f80e3e
-
SHA1
91d22e36b0aa0484136b1ee6ae17abb1f4963927
-
SHA256
4bb7ad555a0641fd9020b58ac7fdeb4eab618214f056a489739ad6aa91f528ae
-
SHA512
2c842a461f28225f1cb87a7a904593789f22e5a8f4a33c4b445b0c50c8e07b52b708b670b110ac006be5c997dc8d5b20bf874448abaaeb7a8f817f9f839df597
-
SSDEEP
1536:s2bQcZBZbO8nKwK3Px4wSa43VZFnWFCH2n8yIejHBoswZDg7uj:s2bQF8CPbS71WFCW00HqswRgG
-
Snake Keylogger payload
-
Snakekeylogger family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-