General
-
Target
62bf34501335a0d0ab097a91a61af8020b34eabfa74c6053515244ba601aa367.img
-
Size
464KB
-
Sample
250117-fkycrasnhw
-
MD5
d44bc5b073e701467c2af2889dc2687f
-
SHA1
1d9f9d3d59d13e70221fb6b6d5e22a6fab471dc9
-
SHA256
62bf34501335a0d0ab097a91a61af8020b34eabfa74c6053515244ba601aa367
-
SHA512
cb6eae2a5526e3ea94ba8e9ad380b03d66c92aec475126db1ba3342a8fb8c04652677655d06e240187323669a57bfa611e69d22e202485fb0c96b1f7fabf9d0a
-
SSDEEP
6144:OTErM9in42rv0JkLKpmNG4IST9K+WGCIe8zpDmStL0qGV0lT+BU/rHFV1euZbIus:394284IS8RODRXkupCuqtaZd
Static task
static1
Behavioral task
behavioral1
Sample
Faktura VAT-FV2025011500091._pdf .scr
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Faktura VAT-FV2025011500091._pdf .scr
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7307271992:AAF4MiqD71uea9mzZkKlV2piolfd9UoXP7A/sendMessage?chat_id=1018401531
Targets
-
-
Target
Faktura VAT-FV2025011500091._pdf .scr
-
Size
403KB
-
MD5
d1ce79b1ed07c976f65e3f715eebb42d
-
SHA1
86fd4ef7598e6795379361a3bc931a6fa446cd4b
-
SHA256
b0da8ee7ba9f7867231c71a57402f66ee0a42b89fb130768a680cd0f5c6bbfe7
-
SHA512
51e49160cc915cad92a260bf58ecb7997890336d4402334952069d975cd9ceba17eee7e4e88d99459d81f45d03291c930aad0cd3a65bbe3c65f6e05ba63885c9
-
SSDEEP
6144:8TErM9in42rv0JkLKpmNG4IST9K+WGCIe8zpDmStL0qGV0lT+BU/rHFV1euZbIus:N94284IS8RODRXkupCuqtaZd
Score10/10-
Snake Keylogger payload
-
Snakekeylogger family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-