General
-
Target
Remittance.exe
-
Size
693KB
-
Sample
230610-l3cfwsef25
-
MD5
852266022ac0283a02051764f34af1ef
-
SHA1
fa2162497768899c03b844a4c6aa623b50e610fd
-
SHA256
45e9234add22c91058024b82e30c0b63571122e9c107b6e1d760c3cfaa4d7cbd
-
SHA512
83a0b0878025134a0ec3ba43bd76c26e68ffe876af379835fecdd38730ebc1ca92fec2731a4ee42a9bcadf7252cecd86dd0975766249d1248724cd94b2d12e2f
-
SSDEEP
12288:ewPWR28Le0cY+Yg9fb9cxNMOc/XxRcME3Y8p59+Mwxd2Lsmajktg/GE:ec+xL9Rk9izM9RTqxwPKK
Static task
static1
Behavioral task
behavioral1
Sample
Remittance.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Remittance.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
argona.ro - Port:
26 - Username:
dan.grama@argona.ro - Password:
Argona12!@ - Email To:
trainee@valleycountysar.org
Targets
-
-
Target
Remittance.exe
-
Size
693KB
-
MD5
852266022ac0283a02051764f34af1ef
-
SHA1
fa2162497768899c03b844a4c6aa623b50e610fd
-
SHA256
45e9234add22c91058024b82e30c0b63571122e9c107b6e1d760c3cfaa4d7cbd
-
SHA512
83a0b0878025134a0ec3ba43bd76c26e68ffe876af379835fecdd38730ebc1ca92fec2731a4ee42a9bcadf7252cecd86dd0975766249d1248724cd94b2d12e2f
-
SSDEEP
12288:ewPWR28Le0cY+Yg9fb9cxNMOc/XxRcME3Y8p59+Mwxd2Lsmajktg/GE:ec+xL9Rk9izM9RTqxwPKK
-
Snake Keylogger payload
-
StormKitty payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-