General
-
Target
9b772d731ae3513c192bac1315ca57a5806573e5fbd4d1ee97c36a26e19cb700.z
-
Size
25KB
-
Sample
241026-cshqgswldx
-
MD5
c152a37a8e547114e9d1c07e361e6ace
-
SHA1
f26c09689d479305a4cb5c3acc1912eae397db39
-
SHA256
9b772d731ae3513c192bac1315ca57a5806573e5fbd4d1ee97c36a26e19cb700
-
SHA512
0d4f0514ecc2be6dd27a9028799f588136d446f6a90c121b700b63cb24b4ceda2e73aa355d160b7b93746f707d0a681b9bc2c170b0e1ce493aad0915607b61ec
-
SSDEEP
384:j+22XYubxeq4ADiS4NWawioYMnPUEsT8qv4pRLUcj/f72IQ0Rc87/DMDHnlgGoqt:jWXvoADPMvw5nc74ar4/jv28OHnlg9+P
Static task
static1
Behavioral task
behavioral1
Sample
QUOTATION_OCTQTRA071244PDF.scr
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
QUOTATION_OCTQTRA071244PDF.scr
Resource
win10v2004-20241007-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
gator3220.hostgator.com - Port:
587 - Username:
[email protected] - Password:
G!!HFpD6EwDq*nF
Targets
-
-
Target
QUOTATION_OCTQTRA071244PDF.scr
-
Size
331KB
-
MD5
56a0eb16583c87251084dee7f8e358d2
-
SHA1
ef8f0c3826a8bfd08a670a68711146d2106886b8
-
SHA256
1964205c3ba627bb974acd0338212de06cf442c95b7b1bd17647a2879407b3d8
-
SHA512
789d4c056d7ef46da0f8614175179351221feee357af49e772ccfa4ad4180e58f1cec33d01e75eb9b0db6801ccbe80d8522f0bebda2e936e7e484944b970e30e
-
SSDEEP
768:RbLdbQe2VzEjss2yXg1ILcn0sspAgpq80Lyg1uMN0+dzsRU+eEyl:R5Q7E/pqrLy0uyz+fyl
Score10/10-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-