General
-
Target
Tpnit.exe
-
Size
959KB
-
Sample
240913-n7116a1ara
-
MD5
5b0a60ef51c05675082381b585d61bb8
-
SHA1
a366c2ca83a519d0cff24f7b3ff6cdaa2412f673
-
SHA256
f5b1deb060982e05d98c940ebf0b8d50cef95922fab5fed5ed8c2a9d7acdda80
-
SHA512
7b67910f4b108aafb0c2e3a31128d052d836d4a4be648b7a0603e04800e00a0b709d449835ac0031958eacfa15555844590c49e1e5430aab0316477f01a6480b
-
SSDEEP
24576:4wSCS8u8YPnQ/BpIZ5tkZLRmCfOKu/FAyyaP7y9xlfhqpGcbuueq:RzS38YPn6FZcFe0m9hqocburq
Static task
static1
Behavioral task
behavioral1
Sample
Tpnit.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Tpnit.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7327372938:AAHFwuC3knQ9jY-1T98yh8owXZiixS_neU0/sendMessage?chat_id=6951521546
Targets
-
-
Target
Tpnit.exe
-
Size
959KB
-
MD5
5b0a60ef51c05675082381b585d61bb8
-
SHA1
a366c2ca83a519d0cff24f7b3ff6cdaa2412f673
-
SHA256
f5b1deb060982e05d98c940ebf0b8d50cef95922fab5fed5ed8c2a9d7acdda80
-
SHA512
7b67910f4b108aafb0c2e3a31128d052d836d4a4be648b7a0603e04800e00a0b709d449835ac0031958eacfa15555844590c49e1e5430aab0316477f01a6480b
-
SSDEEP
24576:4wSCS8u8YPnQ/BpIZ5tkZLRmCfOKu/FAyyaP7y9xlfhqpGcbuueq:RzS38YPn6FZcFe0m9hqocburq
-
Snake Keylogger payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-