General
-
Target
MTLADYYASSOVESSELBRIEFDETAILS.exe
-
Size
748KB
-
Sample
240918-wd3a5avenn
-
MD5
e831581bced8750ffada97258b002ead
-
SHA1
a49a29ebfe5e2fad0e051ce28c981d0169f1ea62
-
SHA256
e3c1ca2def13e63fbbb0ab64ee9d5831ea24ef23f0598ef7a89b6215328041c3
-
SHA512
7659d281b7751f22d7a1383887d53d6ded4e7d1bdc83c7bb71ffde0b2f1316ba31d81ea8eab8ee1be261a620c65dbb1d5e26dfcb2a737db21b3158dfea843cd4
-
SSDEEP
12288:wvSqYOE5WEgGpqmzV4uZ380dUxUPtAaesE1gqd1tw8:BcEj4Q80W8RedFx
Static task
static1
Behavioral task
behavioral1
Sample
MTLADYYASSOVESSELBRIEFDETAILS.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
MTLADYYASSOVESSELBRIEFDETAILS.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7148398804:AAESLKl9fVODMrpM8H4Wkq1Zbm-83PcMLro/sendMessage?chat_id=2135869667
Targets
-
-
Target
MTLADYYASSOVESSELBRIEFDETAILS.exe
-
Size
748KB
-
MD5
e831581bced8750ffada97258b002ead
-
SHA1
a49a29ebfe5e2fad0e051ce28c981d0169f1ea62
-
SHA256
e3c1ca2def13e63fbbb0ab64ee9d5831ea24ef23f0598ef7a89b6215328041c3
-
SHA512
7659d281b7751f22d7a1383887d53d6ded4e7d1bdc83c7bb71ffde0b2f1316ba31d81ea8eab8ee1be261a620c65dbb1d5e26dfcb2a737db21b3158dfea843cd4
-
SSDEEP
12288:wvSqYOE5WEgGpqmzV4uZ380dUxUPtAaesE1gqd1tw8:BcEj4Q80W8RedFx
-
Snake Keylogger payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-