General
-
Target
PO 008-01.docx
-
Size
10KB
-
Sample
220913-m18xrafdf8
-
MD5
429b2307c47f8f23fc986c7f48afd03b
-
SHA1
bbefb4c3ce3265ec3096a0e08b7d3d654cda5b99
-
SHA256
ff4935f904a0c7670835cf1ebdda3512b4a86290f35b23be019fdf86bdc4dabe
-
SHA512
5dc58645aa5bb199ae4cf1f757b3eeed2dbf6b1dae03581526a4e2da6cb996a117ab9ddc9ecbf9b43f1361c18f766db19f3a62d90baa3ed8e9284fb7fb2e63ac
-
SSDEEP
192:ScIMmtPf+CUG/bA3/w2OgNrdlJFmQDZ7rhhap30GzV:SPXumAOgNjJFmIZfhMFrJ
Static task
static1
Behavioral task
behavioral1
Sample
PO 008-01.docx
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
PO 008-01.docx
Resource
win10v2004-20220812-en
Malware Config
Extracted
http://users@1806450061/..---------..--------------_----_______---_---______------------/.........................87.doc
Extracted
snakekeylogger
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
LYSV$*b4 - Email To:
[email protected]
Targets
-
-
Target
PO 008-01.docx
-
Size
10KB
-
MD5
429b2307c47f8f23fc986c7f48afd03b
-
SHA1
bbefb4c3ce3265ec3096a0e08b7d3d654cda5b99
-
SHA256
ff4935f904a0c7670835cf1ebdda3512b4a86290f35b23be019fdf86bdc4dabe
-
SHA512
5dc58645aa5bb199ae4cf1f757b3eeed2dbf6b1dae03581526a4e2da6cb996a117ab9ddc9ecbf9b43f1361c18f766db19f3a62d90baa3ed8e9284fb7fb2e63ac
-
SSDEEP
192:ScIMmtPf+CUG/bA3/w2OgNrdlJFmQDZ7rhhap30GzV:SPXumAOgNjJFmIZfhMFrJ
Score10/10-
Snake Keylogger payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Abuses OpenXML format to download file from external location
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-