General
-
Target
fe2bc4496f2a7b4b7273283adf244feaefea1c7c49c8a591aedc636da4a648e9
-
Size
478KB
-
Sample
241213-h6mjgstnfk
-
MD5
d40c414296f9fcb79e9187edaf1bcfd9
-
SHA1
fce528dad0c4812b7c9f86cfcc865bf36e8cfd62
-
SHA256
fe2bc4496f2a7b4b7273283adf244feaefea1c7c49c8a591aedc636da4a648e9
-
SHA512
eb3a889f2816eb9073ce5ed292688346860be50533a618884d53ae405d0de2421fe6eb0ee4a744e946dac5fae64cf7750ba13d1be8c3d5d5f44119f2d1bbb41e
-
SSDEEP
12288:siIDQ86N0wlZ0b/zaDkBhj8HrpQatDg3fRTZ2:siIDQ86VCbraE+ht03fRTw
Static task
static1
Behavioral task
behavioral1
Sample
DHL EXP. ÖDEMENIZE AIT DETAY TALEBI HK.PDF.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
DHL EXP. ÖDEMENIZE AIT DETAY TALEBI HK.PDF.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7125297965:AAFl6eQAjxqGeAfWHpfHbGAtADDAZUyFidM/sendMessage?chat_id=6367688286
Targets
-
-
Target
DHL EXP. ÖDEMENIZE AIT DETAY TALEBI HK.PDF.exe
-
Size
481KB
-
MD5
1c302c125a96760c0aafda4a07fde507
-
SHA1
66a0579202cac79cb0d4332fc09a4e442604ac9d
-
SHA256
3e894a9bbe48bdb106dda36c117de838daa2fbdab68d293c06a6040514e7fdd5
-
SHA512
983c05ecf5ecc49df4f76d14583eb01a5da579857f66b726c361a1753e4b1faa20511e50c6b6232d99ad84b1b7ed33283935954d0b39931b207e4ebff1e442a3
-
SSDEEP
12288:bG8m7IDQ8mNiglZG//zafk5hjqHrpQaTDg3fRLZhGNE:q/7IDQ8mZQ/raGwhT03fRLaNE
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-