General
-
Target
MV GOLDEN SCHULTE.exe
-
Size
973KB
-
Sample
230610-l4hpasfd2w
-
MD5
1e3185eddfd7dabc8746a35ced59f6d1
-
SHA1
3057f2bf376b2cf765b0680b594e4e8417f4bcd8
-
SHA256
24c43375fb726dbf16803dd6289d64984d9de0ed10f6bcc84e3f67b8a52c6904
-
SHA512
bf6faf13d3d50c81aee9954cefbf12adcc089bdee4c390051f12e8361be0daaa58fe383c1edd75ddcedefa53b20b08eb20441b692466ca0d788b91bfc6f0729c
-
SSDEEP
12288:c6pr1Kr5Z5Un71YK+A3MXtwnMUPSpXRJ0EA1slq6xpujejN:kO7qAc9wnNqpXRJ0KujSN
Static task
static1
Behavioral task
behavioral1
Sample
MV GOLDEN SCHULTE.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
MV GOLDEN SCHULTE.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
argona.ro - Port:
26 - Username:
dan.grama@argona.ro - Password:
Argona12!@ - Email To:
trainee@valleycountysar.org
Targets
-
-
Target
MV GOLDEN SCHULTE.exe
-
Size
973KB
-
MD5
1e3185eddfd7dabc8746a35ced59f6d1
-
SHA1
3057f2bf376b2cf765b0680b594e4e8417f4bcd8
-
SHA256
24c43375fb726dbf16803dd6289d64984d9de0ed10f6bcc84e3f67b8a52c6904
-
SHA512
bf6faf13d3d50c81aee9954cefbf12adcc089bdee4c390051f12e8361be0daaa58fe383c1edd75ddcedefa53b20b08eb20441b692466ca0d788b91bfc6f0729c
-
SSDEEP
12288:c6pr1Kr5Z5Un71YK+A3MXtwnMUPSpXRJ0EA1slq6xpujejN:kO7qAc9wnNqpXRJ0KujSN
-
Snake Keylogger payload
-
StormKitty payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-