General
-
Target
24092024_1251_23092024_Inquiry.7z
-
Size
604KB
-
Sample
240924-p3y7fayfna
-
MD5
0eaf6eaefc9937ec2b40b42ee53560d3
-
SHA1
50e8fb6a012f3b7ee6fadb5711f858a0bc176c07
-
SHA256
9f765556ec035b53f7b494b71cd6f77fa8f3309d47b51add2efb1af930e1b0b3
-
SHA512
7365ec7233b3826efc49517c1e14619e613b78a4ec1b7cab67bebb628f30dc7c447282a65932164e9bca3f7135aed8dc1dc751906a147bc779a920e7842a8f4d
-
SSDEEP
12288:9+6Us22R24Q4HNJiCyG5fderC0b79uGMA9e+SoCooXT/+ySU:9SR0W4tJiCI9uQe74oXTH/
Static task
static1
Behavioral task
behavioral1
Sample
Inquiry.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Inquiry.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
pakcentar.ba - Port:
587 - Username:
[email protected] - Password:
Almir.KardasPC!18_ - Email To:
[email protected]
Targets
-
-
Target
Inquiry.exe
-
Size
956KB
-
MD5
6f6fc0f420a60c751458c162a0c2afb8
-
SHA1
794bdb4058e2e3e6447fec6094c7de7a0403317d
-
SHA256
67a5d724397d8d7667689aa4348f5b19858021c44ca63a3a8cd17c02039011da
-
SHA512
5613842a0333322494a3076001e52f8270d5085155e4c8aafd36c70e52c7cf8573e6d1ce11079670468f86716b75faa1bcf6c265bbd3b08fbb0f04d3c92340cb
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1iaCzZ/6tUuhbTKpuh/:7JZoQrbTFZY1iaCF6tUST5h/
Score10/10-
Snake Keylogger payload
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-