General
-
Target
print_01.rar
-
Size
41KB
-
Sample
211207-qdr79sccf9
-
MD5
b110b1c192d9ceddfcac467a2612fbc5
-
SHA1
4ef16d4d2f6b4d63d0e2eb7680b3a0a4c5120377
-
SHA256
fc811ae78b2a99a10bbdab1b4d5930ce3453c697b5e73a4d3f209028a43c27ad
-
SHA512
429039ab1a022e577e2bd806ee95da0966b1b2f3ed5b7f35287e9d038f0c9c725f4ed69f4548bceeca5aece0e54d90f431db058e5fec8965d8986f99e7b197dd
Static task
static1
Behavioral task
behavioral1
Sample
print_01.com.exe
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
print_01.com.exe
Resource
win10-en-20211104
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.dentasel.com - Port:
587 - Username:
kat1@dentasel.com - Password:
DentaselKat1*
Targets
-
-
Target
print_01.com
-
Size
127KB
-
MD5
d1702414a52c34e99dabde54e533d8f5
-
SHA1
1430af931505c5f0a59637d21871b95524635891
-
SHA256
6b3363675164244c512f5f27f200f77238449db1cf0b03fcbec0b7bf5ceeb1c0
-
SHA512
2e26bf52a1dbf9c366591f6189cdb844c593c62f6fd2ecd8c773863235bfb33c8a7ea28c5c8471e1e7af7ec2e11feaa4e39d9427c9f035ef394a8ad376ae3ae3
Score7/10-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-