General
-
Target
ORDER#73672-MAT373674849083403894808434PDF.exe
-
Size
789KB
-
Sample
241111-jvdmwawfmc
-
MD5
a9ec7c7601e1a9e920c673f11f6822a0
-
SHA1
1eae0a877e807c9e922ee17fcb84e7151c1903c0
-
SHA256
7bc26c7ef9089a1b72821fe50dd72359674b683eabd5089cdfea3f46c01c2daa
-
SHA512
68c58c290ef6f3073fffa448ec9247af351c99180773964f87ee9df756b854422525d93b7092eb06047889c24bf3efd5d179c8060ca6ae631889ebcba44f994c
-
SSDEEP
24576:+MwhYTNtE44ooIq/Zx0PARxFWfcFqal/F4X5Zi7:+MwhoMBjIwZq+WfQiX56
Static task
static1
Behavioral task
behavioral1
Sample
ORDER#73672-MAT373674849083403894808434PDF.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
ORDER#73672-MAT373674849083403894808434PDF.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Autografere.ps1
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Autografere.ps1
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot8040460346:AAFN58T9Y0-aqdzScEiebBO06S141L8RsSA/sendMessage?chat_id=6680692809
Targets
-
-
Target
ORDER#73672-MAT373674849083403894808434PDF.exe
-
Size
789KB
-
MD5
a9ec7c7601e1a9e920c673f11f6822a0
-
SHA1
1eae0a877e807c9e922ee17fcb84e7151c1903c0
-
SHA256
7bc26c7ef9089a1b72821fe50dd72359674b683eabd5089cdfea3f46c01c2daa
-
SHA512
68c58c290ef6f3073fffa448ec9247af351c99180773964f87ee9df756b854422525d93b7092eb06047889c24bf3efd5d179c8060ca6ae631889ebcba44f994c
-
SSDEEP
24576:+MwhYTNtE44ooIq/Zx0PARxFWfcFqal/F4X5Zi7:+MwhoMBjIwZq+WfQiX56
Score10/10-
Snake Keylogger payload
-
Snakekeylogger family
-
Blocklisted process makes network request
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
Autografere.Pre
-
Size
53KB
-
MD5
41d376695f4d2ba3de8a8fd41976cffa
-
SHA1
51c8832e28ecfd83020dc5cb125ed4adddfd480d
-
SHA256
070a3ec2310cb2b3742f535ca0e3d25a4209280d7757b0349522b6a905d77c45
-
SHA512
b6d176e6132a5445b2791637f073f32d93be65a1cdb0914e3fcfa706c89fbfc6e0bce0d748da32ccac51884241ec0996e15ffbf7aab7a985427e41456760ca60
-
SSDEEP
768:iPbW+iLXLP62G7zF/pKyEt8qoSTYiIzybFwuhAYwG4csOMlKQpd2bJz:IbW+iLXLWlhKyC8cYvUwAAiCZdU
Score8/10-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-