General
-
Target
VULKAN PVT RFQ 22122022.exe
-
Size
245KB
-
Sample
221223-ep85dafg67
-
MD5
8001e7c2058163248ce789e2040b87b4
-
SHA1
e4ae2d2833a211f032dc03aeb723021f7a89a871
-
SHA256
b3d857405bc06ef7e5822e4d12f5d7128bf50ba6068553ea90db865b35a19a88
-
SHA512
fd79a916402c201af843d46f626047b174fd1b877453cebb73e0bd99c41256fb03eb5044dbfef8ae114c1bd29ee02f6deaba301209c1cb1af825a0d75902df94
-
SSDEEP
6144:Lkw81+T2X4FfzdDr7hJXlITJ2EddcHg3UBqaDOwddvmVt:u1+KXorBbXOWnBFXddWt
Static task
static1
Behavioral task
behavioral1
Sample
VULKAN PVT RFQ 22122022.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
VULKAN PVT RFQ 22122022.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
VULKAN PVT RFQ 22122022.exe
-
Size
245KB
-
MD5
8001e7c2058163248ce789e2040b87b4
-
SHA1
e4ae2d2833a211f032dc03aeb723021f7a89a871
-
SHA256
b3d857405bc06ef7e5822e4d12f5d7128bf50ba6068553ea90db865b35a19a88
-
SHA512
fd79a916402c201af843d46f626047b174fd1b877453cebb73e0bd99c41256fb03eb5044dbfef8ae114c1bd29ee02f6deaba301209c1cb1af825a0d75902df94
-
SSDEEP
6144:Lkw81+T2X4FfzdDr7hJXlITJ2EddcHg3UBqaDOwddvmVt:u1+KXorBbXOWnBFXddWt
Score10/10-
Snake Keylogger payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-