General

  • Target

    detail lengkap transaksi.exe

  • Size

    782KB

  • Sample

    220704-pm8e6shcbj

  • MD5

    0b53aa7e6b17bd001311a1ba06f0cdf8

  • SHA1

    b84cbaf5394fc134cc8580cb9af32179bda31112

  • SHA256

    b232ed857fcb9a8e44f33a40d49ea46d177d6f37f9a83908d2e8aff7fbce6de2

  • SHA512

    98eb6c9f729879c581c71b63d2219eecb711e3b4e53d93a5743c54e6876ed6842de872f5e5fa260cdab8d869e3d08d355a59bb0eac03a5741199027a3750e394

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5273407003:AAG7ZG43PS1FZDrj0gADw0sr_lYis0K5EYU/sendMessage?chat_id=2028572980

Targets

    • Target

      detail lengkap transaksi.exe

    • Size

      782KB

    • MD5

      0b53aa7e6b17bd001311a1ba06f0cdf8

    • SHA1

      b84cbaf5394fc134cc8580cb9af32179bda31112

    • SHA256

      b232ed857fcb9a8e44f33a40d49ea46d177d6f37f9a83908d2e8aff7fbce6de2

    • SHA512

      98eb6c9f729879c581c71b63d2219eecb711e3b4e53d93a5743c54e6876ed6842de872f5e5fa260cdab8d869e3d08d355a59bb0eac03a5741199027a3750e394

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger Payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Tasks