General
-
Target
Inquiry 65621.exe.bin
-
Size
535KB
-
Sample
230501-ydg2asga74
-
MD5
24f71f1a4b23df2ec4a3b397c787f46b
-
SHA1
e6bd139200d4514c9769cbd91bceace8b120d5c7
-
SHA256
69e2e592529984388953e4cc8f782b96ff622fd05c29e455864408f8f6d1d275
-
SHA512
4bd5f694bd180fb243ca985c9dd470095dd0bec004e6eb43ca9780600eebeab42736e03fe46e6f4029f09e985e5e04d35bec0c5d62b333ccfb7821e392c3b561
-
SSDEEP
12288:oSnRKqnAok2N2THEWkbIyYvJ3F7Kwm5BVqy1V:rnPnhWHyYvJ3F7Kwi6o
Static task
static1
Behavioral task
behavioral1
Sample
Inquiry 65621.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Inquiry 65621.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.thanhphuong.com.vn - Port:
587 - Username:
[email protected] - Password:
87IRKR4d
Targets
-
-
Target
Inquiry 65621.exe.bin
-
Size
535KB
-
MD5
24f71f1a4b23df2ec4a3b397c787f46b
-
SHA1
e6bd139200d4514c9769cbd91bceace8b120d5c7
-
SHA256
69e2e592529984388953e4cc8f782b96ff622fd05c29e455864408f8f6d1d275
-
SHA512
4bd5f694bd180fb243ca985c9dd470095dd0bec004e6eb43ca9780600eebeab42736e03fe46e6f4029f09e985e5e04d35bec0c5d62b333ccfb7821e392c3b561
-
SSDEEP
12288:oSnRKqnAok2N2THEWkbIyYvJ3F7Kwm5BVqy1V:rnPnhWHyYvJ3F7Kwi6o
-
Snake Keylogger payload
-
StormKitty payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-