General
-
Target
ac3710ec74a9f12adeb7d84ea6a6ea512c6197d765b2aef9e87a25cbf8d6d9ab
-
Size
497KB
-
Sample
241213-wt6ngsylhj
-
MD5
45f938ced699b68615db63a27bc24ae8
-
SHA1
408156ef59bc3dc9416deec19d265f8baa232339
-
SHA256
ac3710ec74a9f12adeb7d84ea6a6ea512c6197d765b2aef9e87a25cbf8d6d9ab
-
SHA512
c104f08f6695a7cf65e7c7b9d72e5971d484a85ee62b66a9c2aa579cc3d7ae4e23b672335074362f2b5f81e08ec6bd6978f147d64e33549e80c51cc5333c65b3
-
SSDEEP
12288:1C5gM8dYDtR/5rPBPXuheI43w3uXumV1S:mh8diPBPZuheI4g3aum+
Static task
static1
Behavioral task
behavioral1
Sample
hesaphareketi-01.pdf.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
hesaphareketi-01.pdf.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7125297965:AAFl6eQAjxqGeAfWHpfHbGAtADDAZUyFidM/sendMessage?chat_id=6367688286
Targets
-
-
Target
hesaphareketi-01.pdf.exe
-
Size
518KB
-
MD5
60aae388f17fa2f3a35ef004304e1f77
-
SHA1
633cb0391060b7072b85ea08641af16ea4ca37f4
-
SHA256
3acf414852b246c2b13ce4002def7748d070bce40dc48beacc030016b9811487
-
SHA512
fe99f74c89812209fdb33c0fb51008e41da60ed6ee7df519cbd110d38803a5bb5ded46d66bdf2923a469a71b4073dc5c53734d8d450d31b0c9a227db1ef1fc67
-
SSDEEP
12288:kaWBJ3EjSlgM8daDFRT5rP5Pnu7eugHwLuX0mVP4:kaWBJ3Esh8d8n9P9u7eugQLa0mK
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-