General
-
Target
Q-700004637 1004913.rar
-
Size
41KB
-
Sample
211207-q5a33ahghj
-
MD5
6aa535bff38632c97a8091bded3c08b8
-
SHA1
fef88463d9ea85b5bbfcedb6d78a82b4859de671
-
SHA256
5509c7dc3847efece83c6bb9accea4f5a2cf17de4e81e0e66cb0c8b40b773843
-
SHA512
0345738008f4ba6ce885383cd97db16e9d7a0839e67b534ab7d25391336d8ff921eb2892a38d515ae21ee7bb34aee4d3467cc95fce8ec404d1223b070e3dd6da
Static task
static1
Behavioral task
behavioral1
Sample
Q-700004637 1004913.com.exe
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
Q-700004637 1004913.com.exe
Resource
win10-en-20211014
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.dentasel.com - Port:
587 - Username:
kat1@dentasel.com - Password:
DentaselKat1*
Targets
-
-
Target
Q-700004637 1004913.com
-
Size
127KB
-
MD5
d1702414a52c34e99dabde54e533d8f5
-
SHA1
1430af931505c5f0a59637d21871b95524635891
-
SHA256
6b3363675164244c512f5f27f200f77238449db1cf0b03fcbec0b7bf5ceeb1c0
-
SHA512
2e26bf52a1dbf9c366591f6189cdb844c593c62f6fd2ecd8c773863235bfb33c8a7ea28c5c8471e1e7af7ec2e11feaa4e39d9427c9f035ef394a8ad376ae3ae3
Score7/10-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-