General
-
Target
PORTCLEARANCE.exe
-
Size
483KB
-
Sample
240801-zm2mqszhkg
-
MD5
796dd3c159b5fb5ccf4ae2d577ebc488
-
SHA1
246305c1cc97fdd095b51d685f0fd97f1696686c
-
SHA256
8163c8e218f5715e35eddb8dc41327dd5e8ce77bb9652474692b5e72637129cf
-
SHA512
a9deda5a1d0272db5ae50818f5299721783c2cd616163cd64869759c11e1d6d5c1b58b67e6d1b461fe5ca80aa07f08a37e6030436690d8de55b2923adaa67cd8
-
SSDEEP
12288:y8G1KBsTF2SKM/GICWzXQvFrYV10bOnJf5SEXZovH5UP5:2YB2F2SRBzXKKr0b65SiZs5Ux
Static task
static1
Behavioral task
behavioral1
Sample
PORTCLEARANCE.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
PORTCLEARANCE.exe
Resource
win10v2004-20240730-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7392028440:AAH-CFrJrFHkINZPUaSLV0ejLxfxxAvnqa0/sendMessage?chat_id=2135869667
Targets
-
-
Target
PORTCLEARANCE.exe
-
Size
483KB
-
MD5
796dd3c159b5fb5ccf4ae2d577ebc488
-
SHA1
246305c1cc97fdd095b51d685f0fd97f1696686c
-
SHA256
8163c8e218f5715e35eddb8dc41327dd5e8ce77bb9652474692b5e72637129cf
-
SHA512
a9deda5a1d0272db5ae50818f5299721783c2cd616163cd64869759c11e1d6d5c1b58b67e6d1b461fe5ca80aa07f08a37e6030436690d8de55b2923adaa67cd8
-
SSDEEP
12288:y8G1KBsTF2SKM/GICWzXQvFrYV10bOnJf5SEXZovH5UP5:2YB2F2SRBzXKKr0b65SiZs5Ux
-
Snake Keylogger payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-