General
-
Target
Ylvclgj.exe
-
Size
22KB
-
Sample
230929-ktnl5agh9x
-
MD5
24726d59051982bcb1ded3daedaacb0b
-
SHA1
fc2e317d419062860f98f3f0df2f95fcb5ce7718
-
SHA256
99c5c57ec66db2b568df0891d6e8d4c6420e1bcd629ef55f7148659c9759e3eb
-
SHA512
768d523fb9fbf5b44c8ae784c8525fb04a382fefaa2594a222ba5c44aae48023d7330e3e25e7bd238f31d6b4921931c276836dcf90fa43c5beaf752e306e502d
-
SSDEEP
384:eU5ewSdw/L2APL6yRqtxAx+roEOsVK/KO+sB6fOK:FqwCs3RqtGx+roAYP+97
Static task
static1
Behavioral task
behavioral1
Sample
Ylvclgj.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Ylvclgj.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot6563963046:AAGlyBHZ_ALQCHnOUZcYa0FHqP2za43gVaM/sendMessage?chat_id=5262627523
Targets
-
-
Target
Ylvclgj.exe
-
Size
22KB
-
MD5
24726d59051982bcb1ded3daedaacb0b
-
SHA1
fc2e317d419062860f98f3f0df2f95fcb5ce7718
-
SHA256
99c5c57ec66db2b568df0891d6e8d4c6420e1bcd629ef55f7148659c9759e3eb
-
SHA512
768d523fb9fbf5b44c8ae784c8525fb04a382fefaa2594a222ba5c44aae48023d7330e3e25e7bd238f31d6b4921931c276836dcf90fa43c5beaf752e306e502d
-
SSDEEP
384:eU5ewSdw/L2APL6yRqtxAx+roEOsVK/KO+sB6fOK:FqwCs3RqtGx+roAYP+97
-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-