General

  • Target

    854F1E97-5DBB-4A87-A566-33D9012B05E2 pdf.exe

  • Size

    773KB

  • Sample

    220930-qf3f1sdfb3

  • MD5

    4c0879ae07575bf47a534f7591fa31de

  • SHA1

    36bf899720c14b0b6dfc7728bcf2f6a4befd7b13

  • SHA256

    ee7e969904407f4e591c22b00ed91d1ed3f28c717e7075169d405dd157950bb4

  • SHA512

    ec166c0f997ca8b850c34ff0605f10e9fa349d3cc811cebcdd50c92c83c020f2c2c73b8be4d66d49f35d74766f5e3081c55afeb2c196783e5a93467c7e6efbae

  • SSDEEP

    12288:7To0l1k5gTusufEdIbfRGzAo3pnhbI11m7Iusl6XULJiNll3hYWnxEDv6DK:7TmKussEdITReAo3pnhE3usSzPhY2

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5253212199:AAG-02qWN77aEjxlYTZ-WAZ7WOi_I4kCde8/sendMessage?chat_id=2128925974

Targets

    • Target

      854F1E97-5DBB-4A87-A566-33D9012B05E2 pdf.exe

    • Size

      773KB

    • MD5

      4c0879ae07575bf47a534f7591fa31de

    • SHA1

      36bf899720c14b0b6dfc7728bcf2f6a4befd7b13

    • SHA256

      ee7e969904407f4e591c22b00ed91d1ed3f28c717e7075169d405dd157950bb4

    • SHA512

      ec166c0f997ca8b850c34ff0605f10e9fa349d3cc811cebcdd50c92c83c020f2c2c73b8be4d66d49f35d74766f5e3081c55afeb2c196783e5a93467c7e6efbae

    • SSDEEP

      12288:7To0l1k5gTusufEdIbfRGzAo3pnhbI11m7Iusl6XULJiNll3hYWnxEDv6DK:7TmKussEdITReAo3pnhE3usSzPhY2

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Collection

Email Collection

1
T1114

Tasks