General
-
Target
PO SEP.xlsx
-
Size
100KB
-
Sample
220907-tdv6pscea6
-
MD5
9dd1b342e0fabe4a83a36247aea2516a
-
SHA1
461f6f4f5e3ea8bb0f5e6d4a94a1003dcc5629eb
-
SHA256
9eeecfee3b26bebbb096d87164ae7ab429ff1898cbe3197e4fb7216783b78e42
-
SHA512
ce96053da1416b4e8f26e86b3d76a91b78ba35bd2b79263be43cdb3b3c56b6774556defe65aa57a72981ae3fe69258f7208d5203dba731eff27a150535ec9665
-
SSDEEP
3072:FPzswi9p8v3HmIXK7lMvLcAC88tVY61vswFu46:VzswUKPmIX1jcZO61vK46
Static task
static1
Behavioral task
behavioral1
Sample
PO SEP.xlsx
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
PO SEP.xlsx
Resource
win10v2004-20220812-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
LYSV$*b4 - Email To:
[email protected]
Targets
-
-
Target
PO SEP.xlsx
-
Size
100KB
-
MD5
9dd1b342e0fabe4a83a36247aea2516a
-
SHA1
461f6f4f5e3ea8bb0f5e6d4a94a1003dcc5629eb
-
SHA256
9eeecfee3b26bebbb096d87164ae7ab429ff1898cbe3197e4fb7216783b78e42
-
SHA512
ce96053da1416b4e8f26e86b3d76a91b78ba35bd2b79263be43cdb3b3c56b6774556defe65aa57a72981ae3fe69258f7208d5203dba731eff27a150535ec9665
-
SSDEEP
3072:FPzswi9p8v3HmIXK7lMvLcAC88tVY61vswFu46:VzswUKPmIX1jcZO61vK46
Score10/10-
Snake Keylogger payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-