General
-
Target
AO XIANG FZCO Order.exe
-
Size
489KB
-
Sample
231219-rj9vyadadr
-
MD5
3f6fe65fc4eee365ec30277606b3c66a
-
SHA1
a919285f7dc48ddd64807744acdcc82640dfc9fd
-
SHA256
48991f467d8b22b9b36a1495de807796386f98fbadf09e01e1d913bf63951d33
-
SHA512
0f2c526ca7fd994dd1831ff513941e484960e68fc5076cfcc539c893076fae3adbfa77b18641024ef2cefe7625b2bbc3bf138786010a3660d83ca837dee5d5e5
-
SSDEEP
12288:yrpviYJS8Ea54Y0YI7LPyig/jZ0RstLE:yrpasS8v54YavPyigLWqO
Static task
static1
Behavioral task
behavioral1
Sample
AO XIANG FZCO Order.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
AO XIANG FZCO Order.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
AO XIANG FZCO Order.exe
-
Size
489KB
-
MD5
3f6fe65fc4eee365ec30277606b3c66a
-
SHA1
a919285f7dc48ddd64807744acdcc82640dfc9fd
-
SHA256
48991f467d8b22b9b36a1495de807796386f98fbadf09e01e1d913bf63951d33
-
SHA512
0f2c526ca7fd994dd1831ff513941e484960e68fc5076cfcc539c893076fae3adbfa77b18641024ef2cefe7625b2bbc3bf138786010a3660d83ca837dee5d5e5
-
SSDEEP
12288:yrpviYJS8Ea54Y0YI7LPyig/jZ0RstLE:yrpasS8v54YavPyigLWqO
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-