General

  • Target

    7abddd84a926d518913f45f037ff6fd8.exe

  • Size

    122KB

  • Sample

    220921-je84vabcdp

  • MD5

    7abddd84a926d518913f45f037ff6fd8

  • SHA1

    c0cef67c5629996ca42c0a8b873bc9336e1fd3fb

  • SHA256

    3595fe44e3dec516589eae7f91296f3d73663fd4f54023c6e4ec706948d6d90c

  • SHA512

    efb2ddfc42949677bdf4d711e5fdcf2a5515d2fe4e057521012fdcd185969400e16ea26d1bd52a38782b866cd85ed9d547f2c20395dbb1430ba9d32f9fd36f63

  • SSDEEP

    3072:IfBdrbSs0q56KsTFTztgVtLD9YKl/MbIWRPwBVsFbY:aVWTztgVtLD9P/MbIrIb

Malware Config

Extracted

Family

snakekeylogger

Credentials
C2

https://api.telegram.org/bot5476629412:AAGbkcFsGq72YxKoGZjVmRBskss9nHikjMc/sendMessage?chat_id=5594190904

Targets

    • Target

      7abddd84a926d518913f45f037ff6fd8.exe

    • Size

      122KB

    • MD5

      7abddd84a926d518913f45f037ff6fd8

    • SHA1

      c0cef67c5629996ca42c0a8b873bc9336e1fd3fb

    • SHA256

      3595fe44e3dec516589eae7f91296f3d73663fd4f54023c6e4ec706948d6d90c

    • SHA512

      efb2ddfc42949677bdf4d711e5fdcf2a5515d2fe4e057521012fdcd185969400e16ea26d1bd52a38782b866cd85ed9d547f2c20395dbb1430ba9d32f9fd36f63

    • SSDEEP

      3072:IfBdrbSs0q56KsTFTztgVtLD9YKl/MbIWRPwBVsFbY:aVWTztgVtLD9P/MbIrIb

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks