General
-
Target
Due Invoices for 2020.exe
-
Size
739KB
-
Sample
210127-la9vtlxks6
-
MD5
e93485dbb2ff29e594629293f850914f
-
SHA1
2c79c97cbf9fcb3e1859f4d89b1d0c8e26e03822
-
SHA256
0b32f0d8ef0ef999d370afa5a8d00a176c5335ccc69ea4370a20df9ee14616ef
-
SHA512
3b040a07bce553390de45342a711449771e65b25e6d7acf55daf01134b9b2e0fcc56dd5f9621dc422f8b5a1096fc45c71540610fd761ec32bedf0b5f710d3b15
Static task
static1
Behavioral task
behavioral1
Sample
Due Invoices for 2020.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Due Invoices for 2020.exe
Resource
win10v20201028
Malware Config
Targets
-
-
Target
Due Invoices for 2020.exe
-
Size
739KB
-
MD5
e93485dbb2ff29e594629293f850914f
-
SHA1
2c79c97cbf9fcb3e1859f4d89b1d0c8e26e03822
-
SHA256
0b32f0d8ef0ef999d370afa5a8d00a176c5335ccc69ea4370a20df9ee14616ef
-
SHA512
3b040a07bce553390de45342a711449771e65b25e6d7acf55daf01134b9b2e0fcc56dd5f9621dc422f8b5a1096fc45c71540610fd761ec32bedf0b5f710d3b15
Score10/10-
Snake Keylogger Payload
-
Enumerates physical storage devices
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetThreadContext
-