General

  • Target

    Xezmjebyq.exe

  • Size

    11KB

  • Sample

    221003-qndgvshag7

  • MD5

    0932a4710fd713b0da9ffa0c0e6bf852

  • SHA1

    26bdeca5749a32fdb12d146325058aa2feaf26d8

  • SHA256

    22be378fde3c10b23a48858e8dc01955099bfe358989e363c45c15a946730c67

  • SHA512

    7232366b27efecd429ef2375f3c6108f4860053abea5a0fee55b342c8f2ff9b849fb2891b53611af3140066ab02521948a898c93f01132d0eda6fff55ab7dc21

  • SSDEEP

    96:vwOW5f1F++6zaNbs/VG37LfEKvCfjsJ2ckYJuoT2tfZakI+ygggggggggggggb4S:vwLo/s37wK6fj1c6I2OLe35

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5542941782:AAFlsn_FCfYT7D_ZthXK_Udd4a15AE58_Wg/sendMessage?chat_id=2054148913

Targets

    • Target

      Xezmjebyq.exe

    • Size

      11KB

    • MD5

      0932a4710fd713b0da9ffa0c0e6bf852

    • SHA1

      26bdeca5749a32fdb12d146325058aa2feaf26d8

    • SHA256

      22be378fde3c10b23a48858e8dc01955099bfe358989e363c45c15a946730c67

    • SHA512

      7232366b27efecd429ef2375f3c6108f4860053abea5a0fee55b342c8f2ff9b849fb2891b53611af3140066ab02521948a898c93f01132d0eda6fff55ab7dc21

    • SSDEEP

      96:vwOW5f1F++6zaNbs/VG37LfEKvCfjsJ2ckYJuoT2tfZakI+ygggggggggggggb4S:vwLo/s37wK6fj1c6I2OLe35

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Email Collection

1
T1114

Tasks