General
-
Target
1a58c708f0c8b203949c9f180813f7fd6665b2f7bbf6f474b39d94e3d6638a30
-
Size
662KB
-
Sample
211125-vfe3yafhbm
-
MD5
a28c434e703d9d0961f526f87a61109c
-
SHA1
c18ce22d993ee202d7c4e91aeda8f602a1ddb054
-
SHA256
1a58c708f0c8b203949c9f180813f7fd6665b2f7bbf6f474b39d94e3d6638a30
-
SHA512
a380bd060f69d0813fa1c1141fc960225fbeb1a13195ed7349a2d0f7d3ad72e9b37df4f2f8afe45ac8b6bf4997fdc5bac69d9ec93123a1ef5e8f0871dc29e72d
Static task
static1
Behavioral task
behavioral1
Sample
1a58c708f0c8b203949c9f180813f7fd6665b2f7bbf6f474b39d94e3d6638a30.exe
Resource
win10-en-20211104
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
octfirr.shop - Port:
587 - Username:
income@octfirr.shop - Password:
oPU]A^_2)Udl
Targets
-
-
Target
1a58c708f0c8b203949c9f180813f7fd6665b2f7bbf6f474b39d94e3d6638a30
-
Size
662KB
-
MD5
a28c434e703d9d0961f526f87a61109c
-
SHA1
c18ce22d993ee202d7c4e91aeda8f602a1ddb054
-
SHA256
1a58c708f0c8b203949c9f180813f7fd6665b2f7bbf6f474b39d94e3d6638a30
-
SHA512
a380bd060f69d0813fa1c1141fc960225fbeb1a13195ed7349a2d0f7d3ad72e9b37df4f2f8afe45ac8b6bf4997fdc5bac69d9ec93123a1ef5e8f0871dc29e72d
Score10/10-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-