General
-
Target
products.doc
-
Size
23KB
-
Sample
221125-hzzkgadf6y
-
MD5
ba8da36d2efd359e604bd05b452bc448
-
SHA1
1fe06747d2a03f8b293b525d31ffcb4de85c6bb7
-
SHA256
5e12f5142a366cc6500db37936449279fafc38b2048dfa3748be1aa4d422733d
-
SHA512
074d79ccd64ff11372cdd316e7b7acd66122958a204e0b20c82b4b69966e620d02c7d8e1b4d865c28b5f218a0d643be0fda7f6767b0027736138d872bb4b72fc
-
SSDEEP
384:rQMmdOFNYY0aaaIswqPeOrka1+fHQJ+t3rQkRhZL6zx+DaJvbcvKfKUyXjloX4j2:xFx0XaIsnPRIa4fwJMV8xKaJvwB9XB5C
Static task
static1
Behavioral task
behavioral1
Sample
products.rtf
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
products.rtf
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
products.doc
-
Size
23KB
-
MD5
ba8da36d2efd359e604bd05b452bc448
-
SHA1
1fe06747d2a03f8b293b525d31ffcb4de85c6bb7
-
SHA256
5e12f5142a366cc6500db37936449279fafc38b2048dfa3748be1aa4d422733d
-
SHA512
074d79ccd64ff11372cdd316e7b7acd66122958a204e0b20c82b4b69966e620d02c7d8e1b4d865c28b5f218a0d643be0fda7f6767b0027736138d872bb4b72fc
-
SSDEEP
384:rQMmdOFNYY0aaaIswqPeOrka1+fHQJ+t3rQkRhZL6zx+DaJvbcvKfKUyXjloX4j2:xFx0XaIsnPRIa4fwJMV8xKaJvwB9XB5C
Score10/10-
Snake Keylogger payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-