General
-
Target
zamówienia 31012025DJ ZK 25010325_pdf .scr
-
Size
30KB
-
Sample
250131-j1p8vssmbk
-
MD5
08bb8be80a2856a077319f59990154a9
-
SHA1
373db0eedecdd0bb8e3e2457f4390e3a363e1ad6
-
SHA256
61abb5aa05411cf92a1d762864cc824d594ffdd2dad4c2ca7f1c2f0c30e2a786
-
SHA512
b11f003396781bc595c3a7eed18fd3322d23b0bdfc97450d8990060c6f49877d9e7b2e17beaa21a3bf4229d037043985a68962f79192b76ae41f5305b06bf37b
-
SSDEEP
768:F8tDJhV6NTXJabo47/5xxwHBfKuL7BykI8:F8tDJhVKjJabog5/SXBykb
Static task
static1
Behavioral task
behavioral1
Sample
zamówienia 31012025DJ ZK 25010325_pdf .scr
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
zamówienia 31012025DJ ZK 25010325_pdf .scr
Resource
win10v2004-20250129-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot8018149517:AAGK_JH2rbFUhupxezqUln9lvYu9km5btWY/sendMessage?chat_id=7250529719
Targets
-
-
Target
zamówienia 31012025DJ ZK 25010325_pdf .scr
-
Size
30KB
-
MD5
08bb8be80a2856a077319f59990154a9
-
SHA1
373db0eedecdd0bb8e3e2457f4390e3a363e1ad6
-
SHA256
61abb5aa05411cf92a1d762864cc824d594ffdd2dad4c2ca7f1c2f0c30e2a786
-
SHA512
b11f003396781bc595c3a7eed18fd3322d23b0bdfc97450d8990060c6f49877d9e7b2e17beaa21a3bf4229d037043985a68962f79192b76ae41f5305b06bf37b
-
SSDEEP
768:F8tDJhV6NTXJabo47/5xxwHBfKuL7BykI8:F8tDJhVKjJabog5/SXBykb
Score10/10-
Snake Keylogger payload
-
Snakekeylogger family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-