General

  • Target

    Purchase Order No.KL0093 Athens Branch.exe

  • Size

    1.0MB

  • Sample

    220928-tqtteahfar

  • MD5

    49f36f87be737a71e153cdb06d32736a

  • SHA1

    a62012c8bc5f66f36228bc6b746381805f54412f

  • SHA256

    19365435590c1225513df7750eddec47c42680761a0fb946e10085d3aab90b3f

  • SHA512

    cb73a6505203b432864f2ce6155285d81b443889e96796bab65c2ff97b3c8508da26816b8217453ecfccc8c6e56794351a971656eb668ec0b6bd88fca5458a2f

  • SSDEEP

    12288:ipPXpPweBdKmPz88e4C1V4C+suCqbxEBPAsV7vPr/8dRvPxNd27BcPYNzHlZ:ip/p7/qJ1V4jlbWdP5vr8dZxNXP0HT

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5486243913:AAG6Jm7sGsjD2aGDej_Ex1CsQwqX0Sb4YT0/sendMessage?chat_id=1760125104

Targets

    • Target

      Purchase Order No.KL0093 Athens Branch.exe

    • Size

      1.0MB

    • MD5

      49f36f87be737a71e153cdb06d32736a

    • SHA1

      a62012c8bc5f66f36228bc6b746381805f54412f

    • SHA256

      19365435590c1225513df7750eddec47c42680761a0fb946e10085d3aab90b3f

    • SHA512

      cb73a6505203b432864f2ce6155285d81b443889e96796bab65c2ff97b3c8508da26816b8217453ecfccc8c6e56794351a971656eb668ec0b6bd88fca5458a2f

    • SSDEEP

      12288:ipPXpPweBdKmPz88e4C1V4C+suCqbxEBPAsV7vPr/8dRvPxNd27BcPYNzHlZ:ip/p7/qJ1V4jlbWdP5vr8dZxNXP0HT

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks