General

  • Target

    Rogdfquub.exe

  • Size

    30KB

  • Sample

    220704-wjcyescee3

  • MD5

    23ba82c67551d397d13d018d93a32d06

  • SHA1

    66cdf6745d666f1c09299262df3ebd3f014be20a

  • SHA256

    63b747c34c71ae08653978a800692893d7ae5be122ecbaf482f7b8cff6cf3c8c

  • SHA512

    b105f99db716291717df0b42675fc3a9bea63a8e1e494a92147e3bbcc1d7888a7d80a0f6f0e728893437d198d29d5ee365275663d158f2396b2bbd69bb3fa0d8

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot1939897600:AAFkoPsh0GqeaOfexc3PJ91CjFvH6rmGT-M/sendMessage?chat_id=1715191138

Targets

    • Target

      Rogdfquub.exe

    • Size

      30KB

    • MD5

      23ba82c67551d397d13d018d93a32d06

    • SHA1

      66cdf6745d666f1c09299262df3ebd3f014be20a

    • SHA256

      63b747c34c71ae08653978a800692893d7ae5be122ecbaf482f7b8cff6cf3c8c

    • SHA512

      b105f99db716291717df0b42675fc3a9bea63a8e1e494a92147e3bbcc1d7888a7d80a0f6f0e728893437d198d29d5ee365275663d158f2396b2bbd69bb3fa0d8

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger Payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Email Collection

1
T1114

Tasks