General
-
Target
RFQ MR 27138.xls
-
Size
1.0MB
-
Sample
221125-htsjzadb9x
-
MD5
768b4fdf9eb74f35ccc942f5d7781eef
-
SHA1
12831b407cd266ae56b2884a94b35ecf6503ccda
-
SHA256
a579d0b705185f55e7fa599681d06601ed89468ed46160d631b54fefb1706ac2
-
SHA512
b0b88e4419313fff32fc53b0ae4b2dfa0e1c90a28a3a2ccb8188becc66f38b7c7e8a271bc22475f2f9bc5280f33722299531474f683b9268534abfe81cb7b47b
-
SSDEEP
24576:kr5XXXXXXXXXXXXUXXXXXXXSXXXXXXXXVmZr5XXXXXXXXXXXXUXXXXXXXSXXXXXd:F
Static task
static1
Behavioral task
behavioral1
Sample
RFQ MR 27138.xls
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
RFQ MR 27138.xls
Resource
win10v2004-20221111-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
doDHyw%0 - Email To:
[email protected]
Targets
-
-
Target
RFQ MR 27138.xls
-
Size
1.0MB
-
MD5
768b4fdf9eb74f35ccc942f5d7781eef
-
SHA1
12831b407cd266ae56b2884a94b35ecf6503ccda
-
SHA256
a579d0b705185f55e7fa599681d06601ed89468ed46160d631b54fefb1706ac2
-
SHA512
b0b88e4419313fff32fc53b0ae4b2dfa0e1c90a28a3a2ccb8188becc66f38b7c7e8a271bc22475f2f9bc5280f33722299531474f683b9268534abfe81cb7b47b
-
SSDEEP
24576:kr5XXXXXXXXXXXXUXXXXXXXSXXXXXXXXVmZr5XXXXXXXXXXXXUXXXXXXXSXXXXXd:F
Score10/10-
Snake Keylogger payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-