General
-
Target
c4acb39fb93d5956f061a9ab463a596a28e5f9d3a6a62e43f1cbf7de55835d4f
-
Size
498KB
-
Sample
231206-f2bv3sbf42
-
MD5
c732fdb0eab89de4a31e862346c9ec13
-
SHA1
2b1a2f96efe846ed223fac451855e6b253f4b454
-
SHA256
c4acb39fb93d5956f061a9ab463a596a28e5f9d3a6a62e43f1cbf7de55835d4f
-
SHA512
82952d20572b46fecb1022afc838237db52e579546409e591b697414584f264b11f8a2643fd5a2ebc8bfb5143bc44d3c6e320a7efcae6cc4689c3c12cbfa4f4f
-
SSDEEP
12288:351EVrfyOYFNs3QkbAoxi6Kb5VRPDu1qjGLej2I:pWmOYNsbAoMryYtjX
Static task
static1
Behavioral task
behavioral1
Sample
PO2012066373 -23-pages-2-3.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
PO2012066373 -23-pages-2-3.exe
Resource
win10v2004-20231201-en
Malware Config
Targets
-
-
Target
PO2012066373 -23-pages-2-3.exe
-
Size
530KB
-
MD5
1e9bd17b41b3d22d9f1d0ede3af18439
-
SHA1
37cbc2fc2bb09be167af47fd22a5f51d1be73383
-
SHA256
9a14222cf7f17d59fc5c4a1eff5fbfd662bf4d42c6355258d10e25c8f4ff8f2f
-
SHA512
06905c18205bdfa87eb73fe050177e915502295952fd70f73edb5b258842c953b41afc18187a2370a0bd92561438dbccc74655b595e38ba3c34add9bcf462764
-
SSDEEP
12288:KmPQaueH5qMz95lgBCDAjAFLExSdyw3xodJMqFVVU7kFtSCsqhKpkKlxdVx2:KmNqMz95OcDqAaEcFVMuACFirdVx
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-