General
-
Target
02022025_1558_31012025_zamówienia 31012025DJ ZK 25010325_pdf .img
-
Size
90KB
-
Sample
250202-tes3qsymct
-
MD5
b492fbad6fcf1a52a6885ecd90f82fad
-
SHA1
090823f6ecc336016f73be97453e799aad0fec2d
-
SHA256
2e06804809b8ab5372347740576ab0d8db7212d487118470f30aec3d1845ff74
-
SHA512
dbb1f3be92f9f66a7201e9bc7636023ca1ef05b28b8a5a093efa791722ad622da722dd1813cf87dbe89118fc762a37eafddc8d2c103dc8cd1b463fc6d227cf65
-
SSDEEP
768:Nhj8tDJhV6NTXJabo47/5xxwHBfKuL7BykI8:Nx8tDJhVKjJabog5/SXBykb
Static task
static1
Behavioral task
behavioral1
Sample
zamówienia 31012025DJ ZK 25010325_pdf .scr
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
zamówienia 31012025DJ ZK 25010325_pdf .scr
Resource
win10v2004-20250129-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot8018149517:AAGK_JH2rbFUhupxezqUln9lvYu9km5btWY/sendMessage?chat_id=7250529719
Targets
-
-
Target
zamówienia 31012025DJ ZK 25010325_pdf .scr
-
Size
30KB
-
MD5
08bb8be80a2856a077319f59990154a9
-
SHA1
373db0eedecdd0bb8e3e2457f4390e3a363e1ad6
-
SHA256
61abb5aa05411cf92a1d762864cc824d594ffdd2dad4c2ca7f1c2f0c30e2a786
-
SHA512
b11f003396781bc595c3a7eed18fd3322d23b0bdfc97450d8990060c6f49877d9e7b2e17beaa21a3bf4229d037043985a68962f79192b76ae41f5305b06bf37b
-
SSDEEP
768:F8tDJhV6NTXJabo47/5xxwHBfKuL7BykI8:F8tDJhVKjJabog5/SXBykb
Score10/10-
Snake Keylogger payload
-
Snakekeylogger family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-