General

  • Target

    USD 16,750.05 Pdf.exe

  • Size

    509KB

  • Sample

    220706-qjx1psfbd3

  • MD5

    09bbf8c6dc1b54b203b7c43c22459195

  • SHA1

    dc1d716a403c9f35cf23d4a4f07973c2baba2193

  • SHA256

    1bc45f2405cdf999cc944674cb3183b6157ded7f17789a5dab48e980d54a04ed

  • SHA512

    b76e26046790c65e15b81ffc27847248e917866977c121101b26fda356506a9cccc1e5702b4ec5f293d2e9e5081ae180a8354070d1ca01a67f7d4f168e3199fb

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5597218256:AAE2Fu3SsKk-6ykjeaejgKQbF6Pwo3Ge3Aw/sendMessage?chat_id=1502175288

Targets

    • Target

      USD 16,750.05 Pdf.exe

    • Size

      509KB

    • MD5

      09bbf8c6dc1b54b203b7c43c22459195

    • SHA1

      dc1d716a403c9f35cf23d4a4f07973c2baba2193

    • SHA256

      1bc45f2405cdf999cc944674cb3183b6157ded7f17789a5dab48e980d54a04ed

    • SHA512

      b76e26046790c65e15b81ffc27847248e917866977c121101b26fda356506a9cccc1e5702b4ec5f293d2e9e5081ae180a8354070d1ca01a67f7d4f168e3199fb

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger Payload

    • Downloads MZ/PE file

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Tasks