General
-
Target
currency denominations and breakdown.doc
-
Size
17KB
-
Sample
230313-1jq79scb66
-
MD5
1ca102c7761705407ba01d1630f1d889
-
SHA1
26c8fb559a903e60b65d308f303010265038e468
-
SHA256
6d8231884b670a4eb63ad9f3083bfa4f244d420af8146448b9101df761e4d56a
-
SHA512
3419ab82f12f693e94a966c2b888e5c1ff1893f24c2bb135b033a0bd0a8a6897afe162ded7e8ebd5feee5a9db48346a417f7f19cf0943db29d8021d7a7bdb83d
-
SSDEEP
384:PL0AbZSy3ZW662JY80iOgfk8jN3TT8r5rnYcc:PwAbZSY93V0xgPN/QlY/
Static task
static1
Behavioral task
behavioral1
Sample
currency denominations and breakdown.rtf
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
currency denominations and breakdown.rtf
Resource
win10v2004-20230220-en
Malware Config
Targets
-
-
Target
currency denominations and breakdown.doc
-
Size
17KB
-
MD5
1ca102c7761705407ba01d1630f1d889
-
SHA1
26c8fb559a903e60b65d308f303010265038e468
-
SHA256
6d8231884b670a4eb63ad9f3083bfa4f244d420af8146448b9101df761e4d56a
-
SHA512
3419ab82f12f693e94a966c2b888e5c1ff1893f24c2bb135b033a0bd0a8a6897afe162ded7e8ebd5feee5a9db48346a417f7f19cf0943db29d8021d7a7bdb83d
-
SSDEEP
384:PL0AbZSy3ZW662JY80iOgfk8jN3TT8r5rnYcc:PwAbZSY93V0xgPN/QlY/
Score10/10-
Snake Keylogger payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-