General
-
Target
PO.exe
-
Size
46KB
-
Sample
211019-j415jagcer
-
MD5
e1691792a224589da073a634cf6e890c
-
SHA1
3813c44eedb4e6056bc678323735b025cf080922
-
SHA256
2ce55f36ec8460c1273af1411d76c3af53a3861974d66b6a168218e6af7431e4
-
SHA512
0dfd5c51f7ef77097ff4810727eaf904d5ef1eb2b5ac32ed0ac6a2fa6f25b22ab9e28fba91f37e80bbf9aaa76b7f52405ec5538332e238f1996502598fedad7c
Static task
static1
Behavioral task
behavioral1
Sample
PO.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
PO.exe
Resource
win10-en-20210920
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
smtp.live.com - Port:
587 - Username:
[email protected] - Password:
happyhome123456
Targets
-
-
Target
PO.exe
-
Size
46KB
-
MD5
e1691792a224589da073a634cf6e890c
-
SHA1
3813c44eedb4e6056bc678323735b025cf080922
-
SHA256
2ce55f36ec8460c1273af1411d76c3af53a3861974d66b6a168218e6af7431e4
-
SHA512
0dfd5c51f7ef77097ff4810727eaf904d5ef1eb2b5ac32ed0ac6a2fa6f25b22ab9e28fba91f37e80bbf9aaa76b7f52405ec5538332e238f1996502598fedad7c
Score10/10-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-