General

  • Target

    Tfjnxiks.exe

  • Size

    23KB

  • Sample

    220930-mhnh4aebdq

  • MD5

    4a92a35506b612f74f70eab6c6e806f2

  • SHA1

    2bb0fd33705a6d7451740de2381035a18d6d7098

  • SHA256

    f4dd38fe1cc238d69c12b35d29b745da5290efca68e8271e4dc80c7a8659c398

  • SHA512

    ea04cac8f1cbc7b5ac4bad1a76ef2d7d31138242693d6f5e2be40c240a18ea9aae16b0a0c054b95bb606831b9d3bd56a732fa960e39b189f080727cd8fd73895

  • SSDEEP

    384:d+unxPcTgGjjS8igT/TnFYuEbhbZEs9bhU1u2bQ1fxwQUNjVrXo:dNnxPcTPfSyTrnFYuihNbhUs2bm+QAB0

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5542941782:AAFlsn_FCfYT7D_ZthXK_Udd4a15AE58_Wg/sendMessage?chat_id=2054148913

Targets

    • Target

      Tfjnxiks.exe

    • Size

      23KB

    • MD5

      4a92a35506b612f74f70eab6c6e806f2

    • SHA1

      2bb0fd33705a6d7451740de2381035a18d6d7098

    • SHA256

      f4dd38fe1cc238d69c12b35d29b745da5290efca68e8271e4dc80c7a8659c398

    • SHA512

      ea04cac8f1cbc7b5ac4bad1a76ef2d7d31138242693d6f5e2be40c240a18ea9aae16b0a0c054b95bb606831b9d3bd56a732fa960e39b189f080727cd8fd73895

    • SSDEEP

      384:d+unxPcTgGjjS8igT/TnFYuEbhbZEs9bhU1u2bQ1fxwQUNjVrXo:dNnxPcTPfSyTrnFYuihNbhUs2bm+QAB0

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks