General

  • Target

    confirmations.exe

  • Size

    712KB

  • Sample

    220806-hwhsjsbhbk

  • MD5

    4ab1f4f9bdadbdb865bbc24c5139ee5b

  • SHA1

    fa1291a26d6716f709c7526b6033bc0dbe49c016

  • SHA256

    8c8d32ce1daf82a1e2864bdf0d86bd17ba7e2282dd549a826242181ef04b9183

  • SHA512

    f85f64e326b2be36271189e50ea6eed10cabc0776a646e3f8b3ab5ae0b8a00e96e1c498218e80b88c13ffff75d52aaf4054d14c9095b42becebb33affdceba8b

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5438794068:AAGoE4bpAIHtaGy3WdbPtgtC0pMD4Rz1TZU/sendMessage?chat_id=5268739623

Targets

    • Target

      confirmations.exe

    • Size

      712KB

    • MD5

      4ab1f4f9bdadbdb865bbc24c5139ee5b

    • SHA1

      fa1291a26d6716f709c7526b6033bc0dbe49c016

    • SHA256

      8c8d32ce1daf82a1e2864bdf0d86bd17ba7e2282dd549a826242181ef04b9183

    • SHA512

      f85f64e326b2be36271189e50ea6eed10cabc0776a646e3f8b3ab5ae0b8a00e96e1c498218e80b88c13ffff75d52aaf4054d14c9095b42becebb33affdceba8b

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks