General
-
Target
pedido n. 374_12092021.exe
-
Size
1.0MB
-
Sample
211209-p2efmsddak
-
MD5
8b70954fa6e6cc11abce5eb3a662854d
-
SHA1
c4e7dd66874a9950f3cf9bdba8754450171f6fcd
-
SHA256
994cc7cf468a58b8e349624496714a2c23cc97f40d7d608d66abb8a700783c1b
-
SHA512
824e998fefd826e5739db3905ce7c8a3e1afffd970bad97d65a1de063fbdd354aa4d7cf447bd96f22bfc0f75402601453f4416479b36f7fb1807416831d7f82a
Static task
static1
Behavioral task
behavioral1
Sample
pedido n. 374_12092021.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
pedido n. 374_12092021.exe
Resource
win10-en-20211208
Malware Config
Targets
-
-
Target
pedido n. 374_12092021.exe
-
Size
1.0MB
-
MD5
8b70954fa6e6cc11abce5eb3a662854d
-
SHA1
c4e7dd66874a9950f3cf9bdba8754450171f6fcd
-
SHA256
994cc7cf468a58b8e349624496714a2c23cc97f40d7d608d66abb8a700783c1b
-
SHA512
824e998fefd826e5739db3905ce7c8a3e1afffd970bad97d65a1de063fbdd354aa4d7cf447bd96f22bfc0f75402601453f4416479b36f7fb1807416831d7f82a
Score10/10-
Snake Keylogger Payload
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-