General
-
Target
SecuriteInfo.com.Win32.PWSX-gen.11871.5360.exe
-
Size
1.0MB
-
Sample
221123-s1cr7scf93
-
MD5
ff4c8c2a72e11c58ce444e11c152457d
-
SHA1
ae8aca6cbb14afa31050842676aa8ede61a14e93
-
SHA256
6f30a64acbfb058f932d378184bc3febe967e7179ed48b21318297ca018e3cb7
-
SHA512
b8d77f63af9ea67289d910e9a515eb6a013493b417380f2c34f7cf5b16c934eb0f75c2ebb7cb292f04f8b139d176acc1cafc8141e5250b65f1bf234afb20c4bf
-
SSDEEP
12288:QRIBYsZ1DX/VDJtV7iDFrt73gLwLPTB/8ORPJjwWRXd3OBdmehIRmMHvSzAsVicD:cIBYkmDBt7wcNhlwWNUBJhIcysA1cD
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.PWSX-gen.11871.5360.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.PWSX-gen.11871.5360.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
SecuriteInfo.com.Win32.PWSX-gen.11871.5360.exe
-
Size
1.0MB
-
MD5
ff4c8c2a72e11c58ce444e11c152457d
-
SHA1
ae8aca6cbb14afa31050842676aa8ede61a14e93
-
SHA256
6f30a64acbfb058f932d378184bc3febe967e7179ed48b21318297ca018e3cb7
-
SHA512
b8d77f63af9ea67289d910e9a515eb6a013493b417380f2c34f7cf5b16c934eb0f75c2ebb7cb292f04f8b139d176acc1cafc8141e5250b65f1bf234afb20c4bf
-
SSDEEP
12288:QRIBYsZ1DX/VDJtV7iDFrt73gLwLPTB/8ORPJjwWRXd3OBdmehIRmMHvSzAsVicD:cIBYkmDBt7wcNhlwWNUBJhIcysA1cD
-
Snake Keylogger payload
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-