General
-
Target
Quarantined Messages (5).zip
-
Size
538KB
-
Sample
221020-qq5dcsfdbl
-
MD5
1da3375caf5b7de1ceef9b74a4402477
-
SHA1
b58cd7e6ee04b2f2529c94ce0f7c93c9e654d20b
-
SHA256
b122631c5b2234417f0043256848e6d2424c9abd7c58d229460629b13d12a171
-
SHA512
87e5f8c6157475841dc8da0842f08f9878e453bb6780f18b2760e9ecb6478fb4f9b08710e2a1720c089b98969c6c8c802f922419f676b962d46bf8389f45ff9d
-
SSDEEP
12288:DHI5AmHA4zZuPhiSEhmLd3f1fKKBW+sq0NtQmNi8nilR3Z:Do5AmHSv0mL91fKKByNtVg
Static task
static1
Behavioral task
behavioral1
Sample
REQUEST FOR QUOTE.exe
Resource
win10-20220812-en
Behavioral task
behavioral2
Sample
REQUEST FOR QUOTE.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
qlRYaFn8 - Email To:
[email protected]
Targets
-
-
Target
REQUEST FOR QUOTE.exe
-
Size
836KB
-
MD5
0d965c09e78c8d3143d65f818ea94665
-
SHA1
833a6c5e2b247f7d343493ae55ee259e41dca1c4
-
SHA256
48e86244539459ac6321572a9163170c10e2c2f4c0ed13a974e569f13d8587b9
-
SHA512
e0bf9931f38862edffd4b089acfb93eb32311d5e9e5512917febd602edeb8cbaf9cc9853dd8f0770f0939394cc787c85bb36d43c9c1e8cb41674bdc7dea7b2c7
-
SSDEEP
12288:jLkIMvqV2fEuBk5HJ5UuVWVF/WnSZwIJD+yd48K5zA88E1ytyktf:vkI9NJGuVPSZwIJDRdrK5zAJE1+
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-