General
-
Target
e01b0ac8411fc377c317ed6aabf5656b400c17bbb4a61b55204ea335bbe2f0ce
-
Size
76KB
-
Sample
211018-v4egbaeaa2
-
MD5
737732b33bdfa729010c81fba507c59e
-
SHA1
a4fe38b55f7ea8618ced754eedbfdfee9b7da5a6
-
SHA256
e01b0ac8411fc377c317ed6aabf5656b400c17bbb4a61b55204ea335bbe2f0ce
-
SHA512
c699c29e68290d0ae6c3a4f392ccb73e29ef00b8808e643a7ca90cbcccd91afa8916c576aba7a48ca79d316bebc332b37f6748ad89b92ef50bab6b93c34be1f9
Static task
static1
Behavioral task
behavioral1
Sample
e01b0ac8411fc377c317ed6aabf5656b400c17bbb4a61b55204ea335bbe2f0ce.exe
Resource
win10-en-20211014
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
budgetn.shop - Port:
587 - Username:
[email protected] - Password:
9RUK)uxN]qqn
Targets
-
-
Target
e01b0ac8411fc377c317ed6aabf5656b400c17bbb4a61b55204ea335bbe2f0ce
-
Size
76KB
-
MD5
737732b33bdfa729010c81fba507c59e
-
SHA1
a4fe38b55f7ea8618ced754eedbfdfee9b7da5a6
-
SHA256
e01b0ac8411fc377c317ed6aabf5656b400c17bbb4a61b55204ea335bbe2f0ce
-
SHA512
c699c29e68290d0ae6c3a4f392ccb73e29ef00b8808e643a7ca90cbcccd91afa8916c576aba7a48ca79d316bebc332b37f6748ad89b92ef50bab6b93c34be1f9
Score10/10-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-