General
-
Target
RFQ000423 - Mouwasat Project_1.rar
-
Size
555KB
-
Sample
230426-saf2yaaa52
-
MD5
cedf6e86a11d28e008a0c975d62efde1
-
SHA1
2a77f4c367bb774bc7efbc72fa6b83c1b5c27d1e
-
SHA256
8f8b5c4f07f3a5ea0d3c37bcfbd9e071679796df2041307bbb62430833c1b994
-
SHA512
bd9377320ce78131f8f8847485e9491c2fbdce2489f9bd7f8d6cfe5694662a7381eec2c2bc06a61728a9a0b35bab3357983f1fbf6303f0850180fd16f47762d9
-
SSDEEP
12288:S1GAhUfEHpS5bbUKFKae2AE2F+6k54pgz0qr2m3NQKTspc:S17uEg5bbU52RHipgxX3NQKApc
Static task
static1
Behavioral task
behavioral1
Sample
RFQ000423 - Mouwasat Project.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
RFQ000423 - Mouwasat Project.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5300146648:AAHnGWyIYhkCfGzD7b3SfmLZj94Y8lXxD90/sendMessage?chat_id=5116181161
Targets
-
-
Target
RFQ000423 - Mouwasat Project.exe
-
Size
797KB
-
MD5
f88493d5d23ff210718dac650c188c0a
-
SHA1
50956790269ef2d3aade78fffc841ce9b15e2bcc
-
SHA256
d4086b64b176925017dd2db176cb3754e172bcec944037e1f3ea53ce48c1303f
-
SHA512
48e97dd7921ee9549c58b1f566f75d0dd4f5f9f9cfd5e0f69701f02fd946bff4add2a2cc9cce112f30484c917d7c4d2082f7a48ee3468168e14bc8f0f34a64a2
-
SSDEEP
12288:f6/9WflU/9gqbQP1BoHmSPrTb0aPHeo/n8hAI:SylUxk1BwmcrTQaPHT/n4
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-