General
-
Target
2021201093810010FG94JK029020020.7z
-
Size
20KB
-
Sample
211021-hs9rvshhh9
-
MD5
7e4248f1c960096b74efd2e7745b9a07
-
SHA1
7b7a9b29255bfc43f9f80dd1b51c488c0fec389f
-
SHA256
8e2a7b1e1c07c69542330a686671ec62d886fe20d6c6691f3cc795fe69848b2e
-
SHA512
ec701c8c85befedcb8a62c018ad5f022f25f79bf099d6880f35cf9d914d80916d6463495fe76921c60f9744def00428eab46055c33e098a1ed7ff12bd7ae5087
Static task
static1
Behavioral task
behavioral1
Sample
2021201093810010FG94JK029020020.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
2021201093810010FG94JK029020020.exe
Resource
win10-en-20211014
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.enmmakina.com.tr - Port:
587 - Username:
m.gul@enmmakina.com.tr - Password:
WG7sfIIm5
Targets
-
-
Target
2021201093810010FG94JK029020020.exe
-
Size
45KB
-
MD5
a89cef9543591e9064a61e35af4876e7
-
SHA1
ac8ebc3e52776ae14dc3f389470e15e65f662a65
-
SHA256
96852c4c159018f2921b641693048a99069159104986e4212307c62e61924032
-
SHA512
5cda6b42d039c94f9eb825dacb71695bdc50307703a7c933b8c2ede785ade2f94c80a9838b9177adf09735697d71c7cd32ed4c9d64ae4bd6902036945263faac
Score10/10-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-