General
-
Target
RFQ.exe
-
Size
807KB
-
Sample
230314-wx1xeaah9x
-
MD5
a85949cb7e0347832913f8f1594c5d6f
-
SHA1
f81bdd8581c6018bc70fc8def3c639a2ad2e7dc6
-
SHA256
a1f98c827c062c3a881bafa2d235125cbf15916093a42a2e5471d27a9071f3e8
-
SHA512
73a0e5be46ee74843ff6bf548727b353bb5836ab8707f0680774edb4904d4abaab944f36315ca226b4ace08f3ca55ad0adef4318db194ac5c50e1ff7ea059975
-
SSDEEP
12288:/JuWJsMSz4oqtmjSQkBGzhse2Twym+x7BcMUau9je8S/FbalgEkbBD5:VsMSz4oqtmjSQk81pMxFUaIXS1QgvB1
Static task
static1
Behavioral task
behavioral1
Sample
RFQ.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
RFQ.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot6028065759:AAGXMc8NHPy2_lXiMVsOvq8DgefjK4ifT-U/sendMessage?chat_id=5069697890
Targets
-
-
Target
RFQ.exe
-
Size
807KB
-
MD5
a85949cb7e0347832913f8f1594c5d6f
-
SHA1
f81bdd8581c6018bc70fc8def3c639a2ad2e7dc6
-
SHA256
a1f98c827c062c3a881bafa2d235125cbf15916093a42a2e5471d27a9071f3e8
-
SHA512
73a0e5be46ee74843ff6bf548727b353bb5836ab8707f0680774edb4904d4abaab944f36315ca226b4ace08f3ca55ad0adef4318db194ac5c50e1ff7ea059975
-
SSDEEP
12288:/JuWJsMSz4oqtmjSQkBGzhse2Twym+x7BcMUau9je8S/FbalgEkbBD5:VsMSz4oqtmjSQk81pMxFUaIXS1QgvB1
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-