General
-
Target
Fatura.lnk
-
Size
1KB
-
Sample
230329-w9zvwaba9v
-
MD5
30b7c40e7d15109c0894baee426f37ab
-
SHA1
e0e5ee2fc9738953d2f22176c6de38c22fbfc39a
-
SHA256
4fd98c69b5b4390092b460cf897a0cda23e7ccf4d72607f11dca06e9faa4ac57
-
SHA512
18ea33405b6b19ab090a7b7c792d75777dfa708ba7bf355a9eec520f69b95e68e1fcdcac2121f9e9ffe6c6b4a9da8262bffcfd122261317dbe3a5d7cade37d04
Static task
static1
Behavioral task
behavioral1
Sample
Fatura.lnk
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Fatura.lnk
Resource
win10v2004-20230220-en
Malware Config
Extracted
http://198.46.174.164/118/try.hta
Extracted
snakekeylogger
Protocol: smtp- Host:
citalmet.com.ar - Port:
587 - Username:
[email protected] - Password:
payment@123
Targets
-
-
Target
Fatura.lnk
-
Size
1KB
-
MD5
30b7c40e7d15109c0894baee426f37ab
-
SHA1
e0e5ee2fc9738953d2f22176c6de38c22fbfc39a
-
SHA256
4fd98c69b5b4390092b460cf897a0cda23e7ccf4d72607f11dca06e9faa4ac57
-
SHA512
18ea33405b6b19ab090a7b7c792d75777dfa708ba7bf355a9eec520f69b95e68e1fcdcac2121f9e9ffe6c6b4a9da8262bffcfd122261317dbe3a5d7cade37d04
Score10/10-
Snake Keylogger payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-