General

  • Target

    9966c9c22e150bc6c7d7cd3a248099c0.exe

  • Size

    709KB

  • Sample

    221001-h4yhzagfck

  • MD5

    9966c9c22e150bc6c7d7cd3a248099c0

  • SHA1

    d85a8fc4babef43ab760e173654ef42f461f3c08

  • SHA256

    232d1eff4613190138b14fd8856151cf65daf4164e80c397a5effe0f3e96509f

  • SHA512

    5d3e69074eea921c48bec81d6aad3848298e57da5fe4a79a7367d193c33166c02d6d0ea89a04292429d2fd2dee938fc12ff21a18379be4bcfb6e032d074b738c

  • SSDEEP

    6144:PtzEWsw3TvajJRvq/fd5hwltNif5I8+XTXWH+u8bd/+xs5VVxNrK2CZutbO64QQH:aqN/QmmruhRip02jF47MxGw

Malware Config

Extracted

Family

snakekeylogger

Credentials
C2

https://api.telegram.org/bot5321688653:AAEI2yqGrOA_-sRZ3xaqutrexraSgFa0AnA/sendMessage?chat_id=5048077662

Targets

    • Target

      9966c9c22e150bc6c7d7cd3a248099c0.exe

    • Size

      709KB

    • MD5

      9966c9c22e150bc6c7d7cd3a248099c0

    • SHA1

      d85a8fc4babef43ab760e173654ef42f461f3c08

    • SHA256

      232d1eff4613190138b14fd8856151cf65daf4164e80c397a5effe0f3e96509f

    • SHA512

      5d3e69074eea921c48bec81d6aad3848298e57da5fe4a79a7367d193c33166c02d6d0ea89a04292429d2fd2dee938fc12ff21a18379be4bcfb6e032d074b738c

    • SSDEEP

      6144:PtzEWsw3TvajJRvq/fd5hwltNif5I8+XTXWH+u8bd/+xs5VVxNrK2CZutbO64QQH:aqN/QmmruhRip02jF47MxGw

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Tasks