General
-
Target
TDH_011523075202IMG.exe
-
Size
2.2MB
-
Sample
211019-p7hegsfgh5
-
MD5
111e78d8cc3e0772ade0782b8365d435
-
SHA1
c53a394e097c1a7a1fb8d8e53ad850c7f3c0c257
-
SHA256
e24e32d3cbe89de6119e8d181205aebd073055e2d4b8c873954213553b639b27
-
SHA512
64631e4d2e882b48d168cbbcbaf7b90a3dafaa5d2c65cdb5cd6dff16eb005c2ffcede50e7194b0c512d59747e0093c1c2f8de24f64ced0e2cd2011631c0e818a
Static task
static1
Behavioral task
behavioral1
Sample
TDH_011523075202IMG.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
TDH_011523075202IMG.exe
Resource
win10-en-20211014
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
budgetn.shop - Port:
587 - Username:
[email protected] - Password:
eC~Z,TG&S9jM
Targets
-
-
Target
TDH_011523075202IMG.exe
-
Size
2.2MB
-
MD5
111e78d8cc3e0772ade0782b8365d435
-
SHA1
c53a394e097c1a7a1fb8d8e53ad850c7f3c0c257
-
SHA256
e24e32d3cbe89de6119e8d181205aebd073055e2d4b8c873954213553b639b27
-
SHA512
64631e4d2e882b48d168cbbcbaf7b90a3dafaa5d2c65cdb5cd6dff16eb005c2ffcede50e7194b0c512d59747e0093c1c2f8de24f64ced0e2cd2011631c0e818a
Score10/10-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-