General

  • Target

    854F1E97-5DBB-4A87-A566-33D9210B50E2 pdf.exe

  • Size

    803KB

  • Sample

    221003-qndgvshbdk

  • MD5

    235906f532358c66aedc8af2fcb5845a

  • SHA1

    05747a0d86096a2d6a4118ad60301c984d5a9201

  • SHA256

    a0ff4d380791e0a1c27881e8b5e817dce2b57a5ea40ab577bce81bd43682c88a

  • SHA512

    d3fa854aa2ebc243891878ad762c3253b7c4fda11891b75f26759cda8618235e3799f569ac33052e0e1b6e4783b39ff66949d00cf4a324e5e757b0224847a569

  • SSDEEP

    12288:oK4HTN7kOmge//hFxgLqPADPg3WKNyErFzK3C9DtbMA/df:okxgcjkP9b3C1KWdf

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5503630831:AAGYIuw8LrLVvQb1hO8ZqTSsce27HhMrEKM/sendMessage?chat_id=1467583453

Targets

    • Target

      854F1E97-5DBB-4A87-A566-33D9210B50E2 pdf.exe

    • Size

      803KB

    • MD5

      235906f532358c66aedc8af2fcb5845a

    • SHA1

      05747a0d86096a2d6a4118ad60301c984d5a9201

    • SHA256

      a0ff4d380791e0a1c27881e8b5e817dce2b57a5ea40ab577bce81bd43682c88a

    • SHA512

      d3fa854aa2ebc243891878ad762c3253b7c4fda11891b75f26759cda8618235e3799f569ac33052e0e1b6e4783b39ff66949d00cf4a324e5e757b0224847a569

    • SSDEEP

      12288:oK4HTN7kOmge//hFxgLqPADPg3WKNyErFzK3C9DtbMA/df:okxgcjkP9b3C1KWdf

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Tasks