General
-
Target
S09900090K.exe
-
Size
206KB
-
Sample
210607-p893rlxmqx
-
MD5
717af05a9247debb55e8a57cb5096df4
-
SHA1
c0f8e0518f372e52fa5245c1ee3992ac02e15a5f
-
SHA256
e4023297b3b3918787683d59c9ebf0c5786cdf50f42f54c50aa5571e7dae29f7
-
SHA512
13a7c5dfe3474f3c4b17a52525203953adb82a82f11e6a688543d00afc6f00eacdced92990802622c885ee88fe01c73d6297d9de6db512f282d35544a243ea15
Static task
static1
Behavioral task
behavioral1
Sample
S09900090K.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
S09900090K.exe
Resource
win10v20210410
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
smtp.1and1.com - Port:
587 - Username:
[email protected] - Password:
Andres1.2
Targets
-
-
Target
S09900090K.exe
-
Size
206KB
-
MD5
717af05a9247debb55e8a57cb5096df4
-
SHA1
c0f8e0518f372e52fa5245c1ee3992ac02e15a5f
-
SHA256
e4023297b3b3918787683d59c9ebf0c5786cdf50f42f54c50aa5571e7dae29f7
-
SHA512
13a7c5dfe3474f3c4b17a52525203953adb82a82f11e6a688543d00afc6f00eacdced92990802622c885ee88fe01c73d6297d9de6db512f282d35544a243ea15
Score10/10-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-