General
-
Target
18092024_1412_18092024_MT LADY YASSO VESSEL BRIEF DETAILS.zip
-
Size
396KB
-
Sample
240918-rh8aqavenc
-
MD5
f12641dd653132bbcd4286e952b52e7b
-
SHA1
a3b07d50f7ef0ac5f79e6af9819d67cc8af45ff9
-
SHA256
1d593f4b99fbdbf63f9aecbf3e03ecef874b31437255d0e4fc2c15a71c0b3bff
-
SHA512
979c339344982c3e32b02b933a91691639fc7ab430bf70e6d4a2dd208a91b54e92386ed820c08a72a62d4ec18ae45fbaf52c6456eba7caff6069a9305dc47c0c
-
SSDEEP
6144:FBzHUZsCs3ovHnTiJWc4h7DedeAAc30dhF67hWXDgeUkCL1wmF1gsqx5VQB6EP+:nzH41Hn2JyxD9AAs0dhF6dWNCL1bbRk1
Static task
static1
Behavioral task
behavioral1
Sample
MT LADY YASSO VESSEL BRIEF DETAILS.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
MT LADY YASSO VESSEL BRIEF DETAILS.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7148398804:AAESLKl9fVODMrpM8H4Wkq1Zbm-83PcMLro/sendMessage?chat_id=2135869667
Targets
-
-
Target
MT LADY YASSO VESSEL BRIEF DETAILS.exe
-
Size
748KB
-
MD5
e831581bced8750ffada97258b002ead
-
SHA1
a49a29ebfe5e2fad0e051ce28c981d0169f1ea62
-
SHA256
e3c1ca2def13e63fbbb0ab64ee9d5831ea24ef23f0598ef7a89b6215328041c3
-
SHA512
7659d281b7751f22d7a1383887d53d6ded4e7d1bdc83c7bb71ffde0b2f1316ba31d81ea8eab8ee1be261a620c65dbb1d5e26dfcb2a737db21b3158dfea843cd4
-
SSDEEP
12288:wvSqYOE5WEgGpqmzV4uZ380dUxUPtAaesE1gqd1tw8:BcEj4Q80W8RedFx
-
Snake Keylogger payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-