General
-
Target
2021201093810010FG94JK029020020.exe
-
Size
45KB
-
Sample
211021-lm85xsaba8
-
MD5
a89cef9543591e9064a61e35af4876e7
-
SHA1
ac8ebc3e52776ae14dc3f389470e15e65f662a65
-
SHA256
96852c4c159018f2921b641693048a99069159104986e4212307c62e61924032
-
SHA512
5cda6b42d039c94f9eb825dacb71695bdc50307703a7c933b8c2ede785ade2f94c80a9838b9177adf09735697d71c7cd32ed4c9d64ae4bd6902036945263faac
Static task
static1
Behavioral task
behavioral1
Sample
2021201093810010FG94JK029020020.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
2021201093810010FG94JK029020020.exe
Resource
win10-en-20210920
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.enmmakina.com.tr - Port:
587 - Username:
m.gul@enmmakina.com.tr - Password:
WG7sfIIm5
Targets
-
-
Target
2021201093810010FG94JK029020020.exe
-
Size
45KB
-
MD5
a89cef9543591e9064a61e35af4876e7
-
SHA1
ac8ebc3e52776ae14dc3f389470e15e65f662a65
-
SHA256
96852c4c159018f2921b641693048a99069159104986e4212307c62e61924032
-
SHA512
5cda6b42d039c94f9eb825dacb71695bdc50307703a7c933b8c2ede785ade2f94c80a9838b9177adf09735697d71c7cd32ed4c9d64ae4bd6902036945263faac
Score10/10-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-