General
-
Target
5278508678676480.zip
-
Size
620KB
-
Sample
210615-xalleddh2x
-
MD5
851a0036cbe5f716a5412683fad71d10
-
SHA1
a2caf08a8846b5bfbf266f16fb3ffdeb7ddf1240
-
SHA256
91e2bd3618147f18d3dc034b94b92fe6e2ce2204db2a4f17138f226388e51947
-
SHA512
03b2960b6a3e893e5d815a109e64708877a76489895eedf1f91b833a01318caf7086c4c7cdd8a716b7cddd466f1418ba26fd181b100537526d4eed9b1fdf4e6e
Static task
static1
Behavioral task
behavioral1
Sample
Urgent Contract Order GH7856648,pdf.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
Urgent Contract Order GH7856648,pdf.exe
Resource
win10v20210410
Malware Config
Extracted
Protocol: smtp- Host:
smtp.tokyocornpo.com - Port:
587 - Username:
finance@tokyocornpo.com - Password:
omQhbG$5
Extracted
snakekeylogger
Protocol: smtp- Host:
smtp.tokyocornpo.com - Port:
587 - Username:
finance@tokyocornpo.com - Password:
omQhbG$5
Targets
-
-
Target
Urgent Contract Order GH7856648,pdf.exe
-
Size
770KB
-
MD5
18d8c2033d993283589d2b94eb6aa825
-
SHA1
bf7929fa64ddcb47fa80ee315795e1c4b3b8375d
-
SHA256
c1d7da411239ffcda665933339ad63ddeb11885e715503988adb463e104c4c97
-
SHA512
c6c2497dab7f0adecca0c0a43b6eeafa522738bd7634c7485baa570b5b86e7cfeaae3289968cd4354452254e5b6650056bbf87127e46440705ee131ecb3d1a7a
Score10/10-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-