General
-
Target
Fnjnpedy.exe
-
Size
32KB
-
Sample
231011-x5hw8sgf7v
-
MD5
61a347aa80bae20fc5908ae86f8790ad
-
SHA1
2163cacdcb0b91e2a4c4cb2e2e021d6148961854
-
SHA256
41ccb4c165200571b2d10047d7e25c85e7a270c2bb6c3438c7f8edce7dc2fc9c
-
SHA512
e1cfd42004c0c1c32af49632769ba84dd93c128e210ced9f47fffbbd3f1324885e4d830b90432c83082c17c44ada91878c33585bdd5cb27c3b47486ae9ecd30c
-
SSDEEP
384:LzsL/CyUCVnCMr2jEKqv++7Jk+qY/sgKwLF12APL6yRqtxAx+roEOPVK/KO+zB6a:aUCVCMrJJd5pRKs3RqtGx+roLYP+ka
Static task
static1
Behavioral task
behavioral1
Sample
Fnjnpedy.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Fnjnpedy.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot6675876060:AAEydIMROdr0XsdBN7fk_mjJRQvyv_ectv4/sendMessage?chat_id=5262627523
Targets
-
-
Target
Fnjnpedy.exe
-
Size
32KB
-
MD5
61a347aa80bae20fc5908ae86f8790ad
-
SHA1
2163cacdcb0b91e2a4c4cb2e2e021d6148961854
-
SHA256
41ccb4c165200571b2d10047d7e25c85e7a270c2bb6c3438c7f8edce7dc2fc9c
-
SHA512
e1cfd42004c0c1c32af49632769ba84dd93c128e210ced9f47fffbbd3f1324885e4d830b90432c83082c17c44ada91878c33585bdd5cb27c3b47486ae9ecd30c
-
SSDEEP
384:LzsL/CyUCVnCMr2jEKqv++7Jk+qY/sgKwLF12APL6yRqtxAx+roEOPVK/KO+zB6a:aUCVCMrJJd5pRKs3RqtGx+roLYP+ka
-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-