General
-
Target
signed copy.rar
-
Size
41KB
-
Sample
211207-vp83dabfam
-
MD5
382d3b3fcd6891653b2765b50c05ab10
-
SHA1
9795b6e40bef68cea61f39e3ea634cfcc560b402
-
SHA256
b3589355b585ea16275aa5eda2dd86c0885da24076e0e4d3108f62ebdc4da881
-
SHA512
a1afe5b6c18a84bb09ab92b46ba7414f003d98899eb67d2de1749b24241fabcd3c531fffc39c73da5eb83071adc92e893cd91569c397d856bc53af7df6fda63b
Static task
static1
Behavioral task
behavioral1
Sample
signed copy.com.exe
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
signed copy.com.exe
Resource
win10-en-20211104
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.dentasel.com - Port:
587 - Username:
kat1@dentasel.com - Password:
DentaselKat1*
Targets
-
-
Target
signed copy.com
-
Size
127KB
-
MD5
d1702414a52c34e99dabde54e533d8f5
-
SHA1
1430af931505c5f0a59637d21871b95524635891
-
SHA256
6b3363675164244c512f5f27f200f77238449db1cf0b03fcbec0b7bf5ceeb1c0
-
SHA512
2e26bf52a1dbf9c366591f6189cdb844c593c62f6fd2ecd8c773863235bfb33c8a7ea28c5c8471e1e7af7ec2e11feaa4e39d9427c9f035ef394a8ad376ae3ae3
Score7/10-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-