General
-
Target
REQUEST FOR QUOTATION E230830F2.exe
-
Size
551KB
-
Sample
231011-x54tpsgf9s
-
MD5
5cdd4d9759d692c0f101ac4a4cc3ff1b
-
SHA1
d396f1500c93da233e7853197c1660a1f918bb80
-
SHA256
8f2fb872277b6270dc478a0a5fba9a19031317e88ba3bbccfc6ab134d27ab675
-
SHA512
61b1ff0894fc1ec57492295488da5dee8d4de9de4007357d9523ff6559bf1087e8286b4cb3e49cc2775cea65ed7fe82edab26f3e6ed985dd7606c0395378c472
-
SSDEEP
12288:9V5gdfX9KNP5XQ4IGivFoKlfp5whynumZcQ/+7V:Qfte559ivWApAyup
Static task
static1
Behavioral task
behavioral1
Sample
REQUEST FOR QUOTATION E230830F2.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
REQUEST FOR QUOTATION E230830F2.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.alualuminium.com.my - Port:
587 - Username:
[email protected] - Password:
U8G4S13#8Zk$ - Email To:
[email protected]
Targets
-
-
Target
REQUEST FOR QUOTATION E230830F2.exe
-
Size
551KB
-
MD5
5cdd4d9759d692c0f101ac4a4cc3ff1b
-
SHA1
d396f1500c93da233e7853197c1660a1f918bb80
-
SHA256
8f2fb872277b6270dc478a0a5fba9a19031317e88ba3bbccfc6ab134d27ab675
-
SHA512
61b1ff0894fc1ec57492295488da5dee8d4de9de4007357d9523ff6559bf1087e8286b4cb3e49cc2775cea65ed7fe82edab26f3e6ed985dd7606c0395378c472
-
SSDEEP
12288:9V5gdfX9KNP5XQ4IGivFoKlfp5whynumZcQ/+7V:Qfte559ivWApAyup
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-