General
-
Target
proforma invoice.exe
-
Size
486KB
-
Sample
220131-wgbmksaehp
-
MD5
9c6c327f42df226c0c09561218bb5119
-
SHA1
2dc652211fdb2b9d0690e6a1d2f692a0c04af2bc
-
SHA256
aaa1238cff25c9609f089d345d805e5ea580e9e9cddfcdd640e446d0dfa3ad27
-
SHA512
70449ac67b625f207a33f1231dca0636c5a9f2837d1d8492ddff394d28f301aa79581fb559502b4d908ad3598f8925e491b3f465de467893c195c7ee44a9f4db
Static task
static1
Behavioral task
behavioral1
Sample
proforma invoice.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
proforma invoice.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
Protocol: smtp- Host:
mail.faks-allied-health.com - Port:
587 - Username:
[email protected] - Password:
$Faks1234
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.faks-allied-health.com - Port:
587 - Username:
[email protected] - Password:
$Faks1234 - Email To:
[email protected]
Targets
-
-
Target
proforma invoice.exe
-
Size
486KB
-
MD5
9c6c327f42df226c0c09561218bb5119
-
SHA1
2dc652211fdb2b9d0690e6a1d2f692a0c04af2bc
-
SHA256
aaa1238cff25c9609f089d345d805e5ea580e9e9cddfcdd640e446d0dfa3ad27
-
SHA512
70449ac67b625f207a33f1231dca0636c5a9f2837d1d8492ddff394d28f301aa79581fb559502b4d908ad3598f8925e491b3f465de467893c195c7ee44a9f4db
-
Snake Keylogger Payload
-
Sets service image path in registry
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-