General
-
Target
Purchase Order (Ref M050417).docx
-
Size
169KB
-
Sample
220524-xs71laaafn
-
MD5
f3507e52fb0692a6fbac4afdc60b0f84
-
SHA1
11ecc242faa42035b8a98e564b6a93eeaaf15338
-
SHA256
21dcb10cb40e5357959aaed507513d8e04e72ba0e348c91288beeb8a00340c42
-
SHA512
8f67a97360b12fc2cdd3bf0f24becc3c39719de58c93a52de47916a9a86445ab5ffb672d06f7be95604034aa3e0861bfa6f1a6a2f7a151179b46722a86716e67
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order (Ref M050417).docx
Resource
win7-20220414-en
Malware Config
Extracted
https://www.mediafire.com/file/66qmupxl6a3kglz/12.dll/file
Extracted
arkei
Default
Extracted
snakekeylogger
Protocol: ftp- Host:
ftp://103.153.77.98/ - Port:
21 - Username:
jfhgjuere12 - Password:
hdhddjhfu1299
Targets
-
-
Target
Purchase Order (Ref M050417).docx
-
Size
169KB
-
MD5
f3507e52fb0692a6fbac4afdc60b0f84
-
SHA1
11ecc242faa42035b8a98e564b6a93eeaaf15338
-
SHA256
21dcb10cb40e5357959aaed507513d8e04e72ba0e348c91288beeb8a00340c42
-
SHA512
8f67a97360b12fc2cdd3bf0f24becc3c39719de58c93a52de47916a9a86445ab5ffb672d06f7be95604034aa3e0861bfa6f1a6a2f7a151179b46722a86716e67
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Snake Keylogger Payload
-
suricata: ET MALWARE Generic gate .php GET with minimal headers
suricata: ET MALWARE Generic gate .php GET with minimal headers
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-