General
-
Target
Orden de compra Nº TM21-12-03.exe,pdf
-
Size
425KB
-
Sample
211204-hlc5badch4
-
MD5
f4b12b5adde064ae3797b5657b20ea97
-
SHA1
30a72ab9a4d73eb3118eec5ce62235d2583105b0
-
SHA256
2ba67828100783fb3af5fbc628bb63d451cce5c93ac372e68993a8146a2cca4d
-
SHA512
e9d5280c9e0bf29a6f2e71443f993cdfec720dbb6ff7cdd625214035985eb9d9e675093b7be86f04b82132e3fad6e3c4338945974ae3d5d0ab89e7ddb9fbe4b3
Static task
static1
Behavioral task
behavioral1
Sample
Orden de compra Nº TM21-12-03.exe,pdf.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
Orden de compra Nº TM21-12-03.exe,pdf.exe
Resource
win10-en-20211104
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
smtp.metalkerhungaria.eu - Port:
587 - Username:
srun@metalkerhungaria.eu - Password:
wQYQDPh9
Targets
-
-
Target
Orden de compra Nº TM21-12-03.exe,pdf
-
Size
425KB
-
MD5
f4b12b5adde064ae3797b5657b20ea97
-
SHA1
30a72ab9a4d73eb3118eec5ce62235d2583105b0
-
SHA256
2ba67828100783fb3af5fbc628bb63d451cce5c93ac372e68993a8146a2cca4d
-
SHA512
e9d5280c9e0bf29a6f2e71443f993cdfec720dbb6ff7cdd625214035985eb9d9e675093b7be86f04b82132e3fad6e3c4338945974ae3d5d0ab89e7ddb9fbe4b3
Score10/10-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-