General
-
Target
RFQ.exe
-
Size
801KB
-
Sample
221003-qndgvshag8
-
MD5
aad07a56490f6741c3921858f3043e79
-
SHA1
a94598c7fc15b6c5acc91f1436dba83997e11e28
-
SHA256
3e2d304ef3b13cf0e4ce178d8b04878537871fe4957a579da336daee46cdeeef
-
SHA512
cf06bbfe743ee7ea0835b3703602b7089e599fa8e2d023546d38b10e77defca4b092697f977fa3b2fe804d303f7b8bfb9d80ef557eebf925c1f998d7dde20e4a
-
SSDEEP
12288:uXstLovH4+5mCTWQg3mlDJwrxMF0LnXRBnU+wD+E542KK4HTN:bAHEtQV72MCLnXXfwDJ5
Static task
static1
Behavioral task
behavioral1
Sample
RFQ.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
RFQ.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
qlRYaFn8 - Email To:
[email protected]
Targets
-
-
Target
RFQ.exe
-
Size
801KB
-
MD5
aad07a56490f6741c3921858f3043e79
-
SHA1
a94598c7fc15b6c5acc91f1436dba83997e11e28
-
SHA256
3e2d304ef3b13cf0e4ce178d8b04878537871fe4957a579da336daee46cdeeef
-
SHA512
cf06bbfe743ee7ea0835b3703602b7089e599fa8e2d023546d38b10e77defca4b092697f977fa3b2fe804d303f7b8bfb9d80ef557eebf925c1f998d7dde20e4a
-
SSDEEP
12288:uXstLovH4+5mCTWQg3mlDJwrxMF0LnXRBnU+wD+E542KK4HTN:bAHEtQV72MCLnXXfwDJ5
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-