General

  • Target

    Ymplhchis.exe

  • Size

    9KB

  • Sample

    230602-k7v85aag37

  • MD5

    66b64cfac83171e194dda651b97aeef0

  • SHA1

    cc65aabb69e797a01c2c06886d523683fc756c19

  • SHA256

    fadc70c73f31f1cd2982bcf510846c09a9ddb209cce4e84d6237803fba50f58b

  • SHA512

    c162987ad139ea66152b3c31a13b8f67d8cf20fc0eac420dd6dea58eefd183ec94a8de6af30be53130f5f7cbc1aca5cb6ce665e362ce145e8eaec59be1cb5bd2

  • SSDEEP

    192:r7IRHVefS0loC4cge45pz/7H/hShLTG1sl/pv6:r7i1efFp4R95B/r/hShLy6hy

Malware Config

Extracted

Family

purecrypter

C2

https://cdn.discordapp.com/attachments/1114088016076619870/1114091109027688478/Ojjkmeqsy.dat

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5996089921:AAFFEnbgTY8Gt8G5jJy6llKhDg_Ha193t7c/sendMessage?chat_id=2054148913

Targets

    • Target

      Ymplhchis.exe

    • Size

      9KB

    • MD5

      66b64cfac83171e194dda651b97aeef0

    • SHA1

      cc65aabb69e797a01c2c06886d523683fc756c19

    • SHA256

      fadc70c73f31f1cd2982bcf510846c09a9ddb209cce4e84d6237803fba50f58b

    • SHA512

      c162987ad139ea66152b3c31a13b8f67d8cf20fc0eac420dd6dea58eefd183ec94a8de6af30be53130f5f7cbc1aca5cb6ce665e362ce145e8eaec59be1cb5bd2

    • SSDEEP

      192:r7IRHVefS0loC4cge45pz/7H/hShLTG1sl/pv6:r7i1efFp4R95B/r/hShLy6hy

    • PureCrypter

      PureCrypter is a .NET malware loader first seen in early 2021.

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks