General
-
Target
RFQ-HL51L05- PO#0010202020A&B.exe
-
Size
329KB
-
Sample
211018-jaqfyaeagm
-
MD5
2fbd15a6d2007c2c438c181e952ef389
-
SHA1
fc0f939e922d18a13c67c7957dd84b486472a82e
-
SHA256
359aca28cbb86b8055202dd1fe9cc037e16d8863f979e0dd92f2e74056f467f1
-
SHA512
55ca8374cd971cef30cec5ceb2835112c3b6406038f20cd72373ff74919214722a4988dbca9d6e170b1e7e49d13a8ea4208c9bdbebd16901ace5afe0025e5a9c
Static task
static1
Behavioral task
behavioral1
Sample
RFQ-HL51L05- PO#0010202020A&B.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
RFQ-HL51L05- PO#0010202020A&B.exe
Resource
win10-en-20211014
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
iwRaBVG6
https://api.telegram.org/bot2043981125:AAGaa5K6uc5rV5LARENbXhpoD0InPrKgKJI/sendMessage?chat_id=2062013058
Targets
-
-
Target
RFQ-HL51L05- PO#0010202020A&B.exe
-
Size
329KB
-
MD5
2fbd15a6d2007c2c438c181e952ef389
-
SHA1
fc0f939e922d18a13c67c7957dd84b486472a82e
-
SHA256
359aca28cbb86b8055202dd1fe9cc037e16d8863f979e0dd92f2e74056f467f1
-
SHA512
55ca8374cd971cef30cec5ceb2835112c3b6406038f20cd72373ff74919214722a4988dbca9d6e170b1e7e49d13a8ea4208c9bdbebd16901ace5afe0025e5a9c
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-