General

  • Target

    NEW_PO#671928273.exe

  • Size

    1.0MB

  • Sample

    220920-jspmcsfhfq

  • MD5

    415954ffa0e22511ace125a0dac71ecc

  • SHA1

    b6ed3636a9c47cc4bddcb3615853234a095c1b5d

  • SHA256

    e0cd24aec11fb4e4cdcd1e5932ca75ff201ab1087be33d3a3f94ed8e18a4eff2

  • SHA512

    4c0e6dbce8027535701b08d926c446bedf070d55193323d9f707a4a508d597b69f0f8e8739b6150dafadb5381b5fadff6436c259483d65d115b0c64f974d3708

  • SSDEEP

    12288:UycPeCXhywOPFbM2jG5zGg47eNJluhGGYswhPs9Um:JcPeGYyEQzGg0ipGYsP

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5587666659:AAG8NrrXJQs__dhk8nLJBFOspz2my8OVpX0/sendMessage?chat_id=5569775004

Targets

    • Target

      NEW_PO#671928273.exe

    • Size

      1.0MB

    • MD5

      415954ffa0e22511ace125a0dac71ecc

    • SHA1

      b6ed3636a9c47cc4bddcb3615853234a095c1b5d

    • SHA256

      e0cd24aec11fb4e4cdcd1e5932ca75ff201ab1087be33d3a3f94ed8e18a4eff2

    • SHA512

      4c0e6dbce8027535701b08d926c446bedf070d55193323d9f707a4a508d597b69f0f8e8739b6150dafadb5381b5fadff6436c259483d65d115b0c64f974d3708

    • SSDEEP

      12288:UycPeCXhywOPFbM2jG5zGg47eNJluhGGYswhPs9Um:JcPeGYyEQzGg0ipGYsP

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks