General
-
Target
file01.ps1
-
Size
541KB
-
Sample
220930-3lch1afbb6
-
MD5
8b1e1389854e7efed04472288a9445d8
-
SHA1
9cb77f0e0e7c1276d684e88c384155ee9504fe1a
-
SHA256
21d2842bf7e9b12dec350a2fdb9a8185c3ec1e07d27d631e2ed5909065c22551
-
SHA512
2edc673d0df9933ce2f13f24e435edb743de5b334b5abbdfaa9ad3f63170643804c6ac945d5a98d4422ccbcd1abd039202cc94b3468c4f2919f0cda85061a926
-
SSDEEP
12288:vXi4xmh3fnwCiEgzChnmYyUX3EjZrk2SvvGrdKNOQCqe6d7:vXa7
Static task
static1
Behavioral task
behavioral1
Sample
file01.ps1
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
file01.ps1
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
file01.ps1
-
Size
541KB
-
MD5
8b1e1389854e7efed04472288a9445d8
-
SHA1
9cb77f0e0e7c1276d684e88c384155ee9504fe1a
-
SHA256
21d2842bf7e9b12dec350a2fdb9a8185c3ec1e07d27d631e2ed5909065c22551
-
SHA512
2edc673d0df9933ce2f13f24e435edb743de5b334b5abbdfaa9ad3f63170643804c6ac945d5a98d4422ccbcd1abd039202cc94b3468c4f2919f0cda85061a926
-
SSDEEP
12288:vXi4xmh3fnwCiEgzChnmYyUX3EjZrk2SvvGrdKNOQCqe6d7:vXa7
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Snake Keylogger payload
-
Registers COM server for autorun
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-