General
-
Target
aa4942da9a41c2c7ce12bc3855eb2350.bin
-
Size
438KB
-
Sample
230206-l455ladd36
-
MD5
2d199b149dd83ba5febbe393980b1f1c
-
SHA1
75ce107e804c40d401587bbbfea64d144423d423
-
SHA256
3174c0df84717ce0a70b569c70444e9b9c8a4da3d6dbe73a0fd1632cac31e610
-
SHA512
fbaeabb45fe4271e1cad7be8da7591b07c2d2dff4897b30ba2e93d9a1f417f08ff5e9055ff85947fad941f2b9fa4636bb3a349933d81ddf1e2153268842ab123
-
SSDEEP
12288:AzcwA646AfoutRVJ6cH3wl6smiTmSu1GRFZ1kr9JsOuxN:+A64quScH3wt3LCr9JsH
Static task
static1
Behavioral task
behavioral1
Sample
c5fcb78f3d8f37ad58277089aa4ad3f4e6f0388ad8ee3c8e19065bab1b7f38e7.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c5fcb78f3d8f37ad58277089aa4ad3f4e6f0388ad8ee3c8e19065bab1b7f38e7.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
pro40.emailserver.vn - Port:
587 - Username:
[email protected] - Password:
Vexa@2013
Targets
-
-
Target
c5fcb78f3d8f37ad58277089aa4ad3f4e6f0388ad8ee3c8e19065bab1b7f38e7.exe
-
Size
483KB
-
MD5
aa4942da9a41c2c7ce12bc3855eb2350
-
SHA1
07ddcf865989c7f5a07a9835f59d222e5a438edd
-
SHA256
c5fcb78f3d8f37ad58277089aa4ad3f4e6f0388ad8ee3c8e19065bab1b7f38e7
-
SHA512
abb6c4b4ccd210623e7eaa3638e142e91b58e22cc09719a6f233402ed451e68af7fe11ef6bb7fd7ff293b68f7042d147f4db388a9a7506815f6640c7e78beab3
-
SSDEEP
12288:2CcmFM0luMoL4Ip5iYVCZWOERUB3HDrOtW:27m20M4IpAqCZZE6B3POc
Score10/10-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-