General
-
Target
7b0e695718975e5743a2b0db5e119826d1715d1d274c3859276bd390c0e3602a
-
Size
577KB
-
Sample
250206-hv57fsyqgj
-
MD5
3eee88f6d999d1d5c17d71091c6a0c76
-
SHA1
b6d06543df0761d9b52ce343e6ac6358d8b1f582
-
SHA256
7b0e695718975e5743a2b0db5e119826d1715d1d274c3859276bd390c0e3602a
-
SHA512
ae6a124e1a48331c749436c4f2186d1a1b53d19d4b0cca982ef8e66b73bfb2bcd62d5869ea162487b2bd5821813b7f28244bca5e9ee21ee2c07e0ee0003b1694
-
SSDEEP
12288:q78HVJlnLLF4crK3yxleaoAgjgajrX4+qyfPG1TE4IMs9f:wcVPKclxdWpjbcq0TE4sd
Static task
static1
Behavioral task
behavioral1
Sample
Supply Tender documents (5 Years Agreement for Supply)_PDF_.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Supply Tender documents (5 Years Agreement for Supply)_PDF_.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7471415635:AAEA2wRbrQkd9OwoRD_hL1tDceuiErS34CY/sendMessage?chat_id=1613755033
Targets
-
-
Target
Supply Tender documents (5 Years Agreement for Supply)_PDF_.exe
-
Size
683KB
-
MD5
adb3f7a91a7aef13a01c2675459495fa
-
SHA1
bfa5e2582adf7077fdb5f1536ab29e4a419f8c0f
-
SHA256
72e253234552253ae4a75775c1c42c4d799e96a4b1b369f52519654a7d8458f7
-
SHA512
4ceb65eb0081012f9124f8c33f51b15001d3aba25152af34b427a9f59e7e4ded7a07f1ba5d2d08fd1aaeea8c31188f6cd9d3e6833987ddfa10bce2d778ccc0e9
-
SSDEEP
12288:m4JF8B6slRIp4QFMcrKTyxleaohl6dEVOAx6il4aHyzK8fUkJiL:m4NsRG4pcTxd2l6C4BI4aSz3Ji
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-