General
-
Target
21c3d7668611d419c77c0744b171bac6
-
Size
624KB
-
Sample
231231-atgtgafbck
-
MD5
21c3d7668611d419c77c0744b171bac6
-
SHA1
758daaf6ce9d8f6ae304d57321e03b27b1960820
-
SHA256
47d3768a194c474fd25e1156391c84fefb84ad1c47d4dee3fc08fbf7cfebfbda
-
SHA512
aa0c261ec85bec8731e4ee3c9195d59e446cfc02552f9bd9ec581d8741330b8852eff049a866afd8a6f65f65e235e3514ca3fe15755c501e6275061760c85b3d
-
SSDEEP
12288:msvEElCnRUJ+spsiu8CyB7jxrTOCcUvaIQpD4rQgqy2Oq/+yS8Ti78HgJ:msMEcnqvxjx/zaIQpsxChS8Ti7sgJ
Static task
static1
Behavioral task
behavioral1
Sample
V13145 Order PO-224005.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
V13145 Order PO-224005.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
BkKMmzZ1
Targets
-
-
Target
V13145 Order PO-224005.exe
-
Size
848KB
-
MD5
134f8689013cea212014b283cc045320
-
SHA1
c926356e92fc074acd8232f8025d5b1df65abe00
-
SHA256
60bc83d86c495e11d556ff933414008ed8228d9c2060fc18e230dea899e46edf
-
SHA512
2cee3220ca629b2d69dd0f1affcecf859a171dafa50d1710a61e80e9b395332a8907039c3951690d95e0e1742c0e7733eb2a33846cf59dfabaf6ce5c64c210bf
-
SSDEEP
12288:byDc9F3nC0Py3gAhDRNCeLterrzVSsjT/RwAkzIV9eoIQ0PPAQmL7RtfiHXtrabJ:bCNC8YUsnRbkDo0dmJ1i92Dx
Score10/10-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-