General
-
Target
Re.Po ORDER.45355.SCAN.PDF...exe
-
Size
561KB
-
Sample
201127-qk1xgtpl4a
-
MD5
1fe0cf1c189cb52b02ed680343b8b488
-
SHA1
b5241295b8558023bf75736c3fedf45c90332efa
-
SHA256
2e143c391d25da4a427a3016ae77beac80fbebcc01062a7207f6ca9036536a70
-
SHA512
570e6c94930d9bbcdf3a1b74375ec90b76532756680254e1287f8eaee3819052436b19eb5d4afccfb8b9f1417cac55557e9c19da9575a8655f1ea7baddb99976
Static task
static1
Behavioral task
behavioral1
Sample
Re.Po ORDER.45355.SCAN.PDF...exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Re.Po ORDER.45355.SCAN.PDF...exe
Resource
win10v20201028
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.bosut.mk - Port:
587 - Username:
[email protected] - Password:
0XsKEemhd6EE
Targets
-
-
Target
Re.Po ORDER.45355.SCAN.PDF...exe
-
Size
561KB
-
MD5
1fe0cf1c189cb52b02ed680343b8b488
-
SHA1
b5241295b8558023bf75736c3fedf45c90332efa
-
SHA256
2e143c391d25da4a427a3016ae77beac80fbebcc01062a7207f6ca9036536a70
-
SHA512
570e6c94930d9bbcdf3a1b74375ec90b76532756680254e1287f8eaee3819052436b19eb5d4afccfb8b9f1417cac55557e9c19da9575a8655f1ea7baddb99976
Score10/10-
Snake Keylogger Payload
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-