General
-
Target
shipment docu.rar
-
Size
41KB
-
Sample
211207-q4nyjahggm
-
MD5
dbea824e98d7bca868dd9d2f9306a1f4
-
SHA1
9b9aa4dded0f46dce34d0dddc06afa6321ece81a
-
SHA256
826f09866b27658ee783e501ae6bbbb967ea034bedad721973f200fb83bfe853
-
SHA512
b3948596f528706566508f7753bad7477277a0414d1b01b9de1aa42681e9e2a41b977d6de0a7156f7dec03d7dc7bb9d3c9bc3ef6aaf98f5a8ce2b325b1f90dcf
Static task
static1
Behavioral task
behavioral1
Sample
shipment docu.com.exe
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
shipment docu.com.exe
Resource
win10-en-20211014
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.dentasel.com - Port:
587 - Username:
kat1@dentasel.com - Password:
DentaselKat1*
Targets
-
-
Target
shipment docu.com
-
Size
127KB
-
MD5
d1702414a52c34e99dabde54e533d8f5
-
SHA1
1430af931505c5f0a59637d21871b95524635891
-
SHA256
6b3363675164244c512f5f27f200f77238449db1cf0b03fcbec0b7bf5ceeb1c0
-
SHA512
2e26bf52a1dbf9c366591f6189cdb844c593c62f6fd2ecd8c773863235bfb33c8a7ea28c5c8471e1e7af7ec2e11feaa4e39d9427c9f035ef394a8ad376ae3ae3
Score7/10-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-