General
-
Target
41347ab5d177516699a95664c9af347f
-
Size
83KB
-
Sample
211018-tzvr3aehcm
-
MD5
41347ab5d177516699a95664c9af347f
-
SHA1
ed91314e9da6cbb4564b94e2abc151f29daa9f69
-
SHA256
67d0b08c6cf36abee6b895c90773663a21131e4bc36ff46726e8ba9a53ed0497
-
SHA512
247fea690c2d0a8e4a6b35dba8f06c8dc21f6bcd0277aeb2e26ca8140e53855a51d089887096d237fc2d8a4b038b07e24b78b539b6d75902a48a44adc5a69488
Static task
static1
Behavioral task
behavioral1
Sample
41347ab5d177516699a95664c9af347f.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
41347ab5d177516699a95664c9af347f.exe
Resource
win10-en-20210920
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
efinancet.shop - Port:
587 - Username:
[email protected] - Password:
SU^QlsaPg%E#
Targets
-
-
Target
41347ab5d177516699a95664c9af347f
-
Size
83KB
-
MD5
41347ab5d177516699a95664c9af347f
-
SHA1
ed91314e9da6cbb4564b94e2abc151f29daa9f69
-
SHA256
67d0b08c6cf36abee6b895c90773663a21131e4bc36ff46726e8ba9a53ed0497
-
SHA512
247fea690c2d0a8e4a6b35dba8f06c8dc21f6bcd0277aeb2e26ca8140e53855a51d089887096d237fc2d8a4b038b07e24b78b539b6d75902a48a44adc5a69488
Score10/10-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-