General
-
Target
Uarngd.exe
-
Size
7KB
-
Sample
230203-spk97sfh46
-
MD5
51b95537e2f88be4e97ca30fd565c6a2
-
SHA1
3c19c4f72b3737b8c365462b578e46a681990470
-
SHA256
3b6d60b69e3438ca5aaad8edf8b87f8c39f72803aa3c90a929aff5239d998333
-
SHA512
d177cfdbec6511d7fce4911b0e2b4d3581bb625d02df2ced2ab3cf774873cae1748f796fa939b269c1d0c267a63f89d82c51784c183c067cd9f9c6a0f89e9c39
-
SSDEEP
96:0+10kTSeg3MLEmVJsdtldCDxLGP8ZY7ZMtblNb6k2wImQgJtXstMtzNt:0+nWeg3SXJ45C5GPGldHbIfgzXEMH
Static task
static1
Behavioral task
behavioral1
Sample
Uarngd.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Uarngd.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5497972920:AAHqqS9EfkxnwYz3pQtCWef33URevfy5tRk/sendMessage?chat_id=1653988628
Targets
-
-
Target
Uarngd.exe
-
Size
7KB
-
MD5
51b95537e2f88be4e97ca30fd565c6a2
-
SHA1
3c19c4f72b3737b8c365462b578e46a681990470
-
SHA256
3b6d60b69e3438ca5aaad8edf8b87f8c39f72803aa3c90a929aff5239d998333
-
SHA512
d177cfdbec6511d7fce4911b0e2b4d3581bb625d02df2ced2ab3cf774873cae1748f796fa939b269c1d0c267a63f89d82c51784c183c067cd9f9c6a0f89e9c39
-
SSDEEP
96:0+10kTSeg3MLEmVJsdtldCDxLGP8ZY7ZMtblNb6k2wImQgJtXstMtzNt:0+nWeg3SXJ45C5GPGldHbIfgzXEMH
-
Detect PureCrypter injector
-
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
Snake Keylogger payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-