General
-
Target
PURCHASE ORDER 07959.exe
-
Size
517KB
-
Sample
210607-evt668clj6
-
MD5
14f1330e77e1ce14f05ade193faca6a1
-
SHA1
0408fe81ba763148c050bae8c8f0471e5965855c
-
SHA256
5d9ffac79344c0091b090160eefa292f87ed3462f24c6ff1b36386cd6a502561
-
SHA512
dbc69ff45ff95a3850848145ae9af8b36bc940c87106d8adedd8bf01f13c859e7584477891259967d568380a8aa7a44c83d99b90f98430d78cdaf8e52eee3b6b
Static task
static1
Behavioral task
behavioral1
Sample
PURCHASE ORDER 07959.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
PURCHASE ORDER 07959.exe
Resource
win10v20210408
Malware Config
Extracted
Protocol: smtp- Host:
mail.totalkitchensandbathrooms.com.au - Port:
587 - Username:
[email protected] - Password:
[[UcaDa#isvT
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.totalkitchensandbathrooms.com.au - Port:
587 - Username:
[email protected] - Password:
[[UcaDa#isvT
Targets
-
-
Target
PURCHASE ORDER 07959.exe
-
Size
517KB
-
MD5
14f1330e77e1ce14f05ade193faca6a1
-
SHA1
0408fe81ba763148c050bae8c8f0471e5965855c
-
SHA256
5d9ffac79344c0091b090160eefa292f87ed3462f24c6ff1b36386cd6a502561
-
SHA512
dbc69ff45ff95a3850848145ae9af8b36bc940c87106d8adedd8bf01f13c859e7584477891259967d568380a8aa7a44c83d99b90f98430d78cdaf8e52eee3b6b
Score10/10-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-