General

  • Target

    New ORUFkqYaRVYJqKoVK.exe

  • Size

    860KB

  • Sample

    221017-g9g8habaar

  • MD5

    d7a0b8fe1026fc6c74730e8a1ec34d1a

  • SHA1

    4b3f5f36cc5ba5cdad3593323740a526aa2a14b8

  • SHA256

    0a22a2255fdbaba55a3d1901e74e709968f363362e2902c5a16bfa6a86e90481

  • SHA512

    14139632f0252ead40534c39459cba7f50e241528a92874f1bbfa559b41627faa1d27e4e232e5215e966b427231b18b01779d46c91d0c83a37fabe32b2910f4c

  • SSDEEP

    12288:dw/fEuzZLHRIml3pJQLwsi/zctnEI+3yiJDpk7OdHOrCE+Rg6j9uVKFkhw:OFLlYLws6YtnmR/k7OVO4RS

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5788931871:AAEfkw_P98L88KrFlXGZzJolFlQrpqGegLg/sendMessage?chat_id=5649714338

Targets

    • Target

      New ORUFkqYaRVYJqKoVK.exe

    • Size

      860KB

    • MD5

      d7a0b8fe1026fc6c74730e8a1ec34d1a

    • SHA1

      4b3f5f36cc5ba5cdad3593323740a526aa2a14b8

    • SHA256

      0a22a2255fdbaba55a3d1901e74e709968f363362e2902c5a16bfa6a86e90481

    • SHA512

      14139632f0252ead40534c39459cba7f50e241528a92874f1bbfa559b41627faa1d27e4e232e5215e966b427231b18b01779d46c91d0c83a37fabe32b2910f4c

    • SSDEEP

      12288:dw/fEuzZLHRIml3pJQLwsi/zctnEI+3yiJDpk7OdHOrCE+Rg6j9uVKFkhw:OFLlYLws6YtnmR/k7OVO4RS

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks