General
-
Target
QUOTATION.exe
-
Size
1.0MB
-
Sample
210607-sw7rkqv6ee
-
MD5
bdc873a7a6e41514faa0d8294731b3b5
-
SHA1
7230e4e49239643b5c379a8d4d01f6d24fff757e
-
SHA256
8b1702fd70eb89fd46daedb3bfb9dd421ed059b6d6e8acdfb04ddc360481e081
-
SHA512
c8d47420885a2ef1644ef237120692f062214ed9fd72e09e285a0a8619df1335ade3219e0b0695ee135d1ca27b26836e5a0b94b0069217ae67c2da6e8833a49e
Static task
static1
Behavioral task
behavioral1
Sample
QUOTATION.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
QUOTATION.exe
Resource
win10v20210410
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
smtp.vivaldi.net - Port:
587 - Username:
[email protected] - Password:
oluwagozie123
Targets
-
-
Target
QUOTATION.exe
-
Size
1.0MB
-
MD5
bdc873a7a6e41514faa0d8294731b3b5
-
SHA1
7230e4e49239643b5c379a8d4d01f6d24fff757e
-
SHA256
8b1702fd70eb89fd46daedb3bfb9dd421ed059b6d6e8acdfb04ddc360481e081
-
SHA512
c8d47420885a2ef1644ef237120692f062214ed9fd72e09e285a0a8619df1335ade3219e0b0695ee135d1ca27b26836e5a0b94b0069217ae67c2da6e8833a49e
Score10/10-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-