General
-
Target
6303866d43b6a330265ddd76b04fcde44ce7eac2c96d659587654fed44c32d1c
-
Size
477KB
-
Sample
241212-j5devszqdn
-
MD5
d03f749e4ece60a93daa9cc608a41ac9
-
SHA1
7ad996e3ae72a7099b5b851ff93b9e1634bafff4
-
SHA256
6303866d43b6a330265ddd76b04fcde44ce7eac2c96d659587654fed44c32d1c
-
SHA512
c62d110c7f89d67ba87f0a37215a1418a5bde6a528e99351ac9c6e7dd41a038af1ea5677c3d14a551d0fd78c66302f50ee81eadfdce9b44b813863030c3f3e89
-
SSDEEP
12288:XUJNcWWMCd+T+Lww4H8HsqAA5eBjcap2vWIFsLTAvR:ksd/wwNHsHA5eiZHFsTAvR
Static task
static1
Behavioral task
behavioral1
Sample
hesaphareketi-01.pdfsxlx..exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
hesaphareketi-01.pdfsxlx..exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7924749806:AAG-WJhqQVHwMR7UVUYahs5tVC-3tNXnruE/sendMessage?chat_id=7009913093
Targets
-
-
Target
hesaphareketi-01.pdfsxlx..exe
-
Size
480KB
-
MD5
0f8fc2216d672397def371eeec7e7ab2
-
SHA1
878e50322452353934614f673fe08e594c278062
-
SHA256
979c906c8edaaafe866628eca9911b766c686da4e69d899c401b0d317b4f1628
-
SHA512
71a7508ac223d76226897d60e1be76a988348fbaa102bc29741c3df847d5d541510ac7a6ecba33afe437d6849e045463f7b53fc34a55a4c296e30b7d128b0134
-
SSDEEP
12288:bL5HNcQWMWd+H+/wg4H+HMqAA5eJjcab2jWIFsLl6wGA:b12dtwgtHMHA5eqRHFslDGA
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-