Analysis
-
max time kernel
85s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
12-04-2023 15:57
Behavioral task
behavioral1
Sample
WhiteSnake.exe
Resource
win7-20230220-en
General
-
Target
WhiteSnake.exe
-
Size
45KB
-
MD5
dd42fe39cf54bc3b95f427dff59c99ce
-
SHA1
d077e75315f5027b18a89a2260509c2eaaa30d43
-
SHA256
b4c9d3abd4fe5b4be84884c933e8d9a6a80ce326e05432a7ecb8a7c28f393941
-
SHA512
59a9c6437fee0708973597a52b9abeaf2acf234a9dafbb61a9b418287d5aec26b24779be6e2e1eef5108fcd88f94a8042ed3d5a49a72945427545c51da1b93c5
-
SSDEEP
384:sC1ZQdFTFzvkPgqMqmrXnS90RNnTz4ayKam/k3LzXhmST4HVlKZ19IEVl9ZF2hSA:BZQ7OP0vTP7W1uVjqEW3ok598
Malware Config
Extracted
gurcu
https://api.telegram.org/bot5690489105:AAEQZjYHEOdNHOLcf-ksLf347CR9V3wq4ss/sendMessage?chat_id=6195973924
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4376 WhiteSnake.exe