General
-
Target
QUOTATION_SEPQTRA071244úPDF.scr.exe
-
Size
1.1MB
-
Sample
241003-hysqjavarh
-
MD5
0b637b2700d31bc9bfee3d704af90762
-
SHA1
1eb843422fe6d469060f4d9be996b32dd47eb0f6
-
SHA256
df6b8ec2501a31a2545d2e3a7033cd403e32c94f9afe15798e0fb53d76f758d9
-
SHA512
9a14dcf7b785ed7a7176a1ff18e6f0060943229ab65061800efbbc9c9409b5cb93cd452bf95ed7efe41745bfdf4f06449cb4991bc154892e2d982da6916e4d7d
-
SSDEEP
24576:kAnzzufFdlZl59t1VNdDPEnF6XKDAOe4H444l:kaGfFdlZl59t1VNdDPBXK+4H444l
Static task
static1
Behavioral task
behavioral1
Sample
QUOTATION_SEPQTRA071244úPDF.scr.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
QUOTATION_SEPQTRA071244úPDF.scr.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
gator3220.hostgator.com - Port:
587 - Username:
[email protected] - Password:
Zg^!Zy[?IKrs99@soltan
Targets
-
-
Target
QUOTATION_SEPQTRA071244úPDF.scr.exe
-
Size
1.1MB
-
MD5
0b637b2700d31bc9bfee3d704af90762
-
SHA1
1eb843422fe6d469060f4d9be996b32dd47eb0f6
-
SHA256
df6b8ec2501a31a2545d2e3a7033cd403e32c94f9afe15798e0fb53d76f758d9
-
SHA512
9a14dcf7b785ed7a7176a1ff18e6f0060943229ab65061800efbbc9c9409b5cb93cd452bf95ed7efe41745bfdf4f06449cb4991bc154892e2d982da6916e4d7d
-
SSDEEP
24576:kAnzzufFdlZl59t1VNdDPEnF6XKDAOe4H444l:kaGfFdlZl59t1VNdDPBXK+4H444l
Score10/10-
Snake Keylogger payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-