General
-
Target
New Tender (IOM)-AL FORM.exe
-
Size
860KB
-
Sample
210722-3qj7da3t2j
-
MD5
6fc8b05c55483843b5333e0f2ec7c2ef
-
SHA1
1a102a545be73435889342f112ff646818098b8f
-
SHA256
4ea025e80130ce357432c651f5e577ee7be047b8dd6d369448f53cf8414ce69e
-
SHA512
0a9e4c49c4feaa41587a7ede9d42a86f6eb6e5098c032205ab48530fec51959e1d98a5c5ed92604369dd3bf2d17a2a7c723f8cd34a47e03b316ca39db32466c9
Static task
static1
Behavioral task
behavioral1
Sample
New Tender (IOM)-AL FORM.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
New Tender (IOM)-AL FORM.exe
Resource
win10v20210408
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
smtp.vivaldi.net - Port:
25 - Username:
[email protected] - Password:
Africanman101
Targets
-
-
Target
New Tender (IOM)-AL FORM.exe
-
Size
860KB
-
MD5
6fc8b05c55483843b5333e0f2ec7c2ef
-
SHA1
1a102a545be73435889342f112ff646818098b8f
-
SHA256
4ea025e80130ce357432c651f5e577ee7be047b8dd6d369448f53cf8414ce69e
-
SHA512
0a9e4c49c4feaa41587a7ede9d42a86f6eb6e5098c032205ab48530fec51959e1d98a5c5ed92604369dd3bf2d17a2a7c723f8cd34a47e03b316ca39db32466c9
Score10/10-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-