General
-
Target
b2039ffb6400d433462ccfefb0f672b6.exe
-
Size
483KB
-
Sample
230107-s1bj5sdh24
-
MD5
b2039ffb6400d433462ccfefb0f672b6
-
SHA1
dc7503f531e0afaf954cb43f964373aeed56cd83
-
SHA256
73f187b8ae22bc5de914056a6dad79f78c0d5de887020b31fda74737df837f78
-
SHA512
591d1beffe914285c760ea611be028c43ac8a39821db8275634dc9b9a2c6d7179c6f268b934e64a63aa42c182282ba9f8831320eb87c8ae97563246e91263369
-
SSDEEP
12288:2CcmFM0luMoL4Ip5iYVCZWOERUB3HDrOtW:27m20M4IpAqCZZE6B3POc
Static task
static1
Behavioral task
behavioral1
Sample
b2039ffb6400d433462ccfefb0f672b6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b2039ffb6400d433462ccfefb0f672b6.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
pro40.emailserver.vn - Port:
587 - Username:
[email protected] - Password:
Vexa@2013
Targets
-
-
Target
b2039ffb6400d433462ccfefb0f672b6.exe
-
Size
483KB
-
MD5
b2039ffb6400d433462ccfefb0f672b6
-
SHA1
dc7503f531e0afaf954cb43f964373aeed56cd83
-
SHA256
73f187b8ae22bc5de914056a6dad79f78c0d5de887020b31fda74737df837f78
-
SHA512
591d1beffe914285c760ea611be028c43ac8a39821db8275634dc9b9a2c6d7179c6f268b934e64a63aa42c182282ba9f8831320eb87c8ae97563246e91263369
-
SSDEEP
12288:2CcmFM0luMoL4Ip5iYVCZWOERUB3HDrOtW:27m20M4IpAqCZZE6B3POc
Score10/10-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-