General

  • Target

    e-dekont.exe

  • Size

    798KB

  • Sample

    221026-hjmwqsfaal

  • MD5

    9b9e526501d1ec734f53161592c32d48

  • SHA1

    a8cc2b30fa509d302275f93a9e9ade0b1f45d8e8

  • SHA256

    7a1be9cf221328688b575556f901eb33100299fc6488baf5a5c7b3611cad95f5

  • SHA512

    7927e1d979622c48f66689f4d6333925bb51a862035400b0e9cc12333347c24889650ef86979fbd817e58af8b7cbb08b04e30f8d5efdf96f438a1528a000778e

  • SSDEEP

    12288:Gh702iNn2iNwAE4DJJPwWjP6urTmoxZZYo3f:X1B1WKDJJ5bmM3

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5587666659:AAG8NrrXJQs__dhk8nLJBFOspz2my8OVpX0/sendMessage?chat_id=5569775004

Targets

    • Target

      e-dekont.exe

    • Size

      798KB

    • MD5

      9b9e526501d1ec734f53161592c32d48

    • SHA1

      a8cc2b30fa509d302275f93a9e9ade0b1f45d8e8

    • SHA256

      7a1be9cf221328688b575556f901eb33100299fc6488baf5a5c7b3611cad95f5

    • SHA512

      7927e1d979622c48f66689f4d6333925bb51a862035400b0e9cc12333347c24889650ef86979fbd817e58af8b7cbb08b04e30f8d5efdf96f438a1528a000778e

    • SSDEEP

      12288:Gh702iNn2iNwAE4DJJPwWjP6urTmoxZZYo3f:X1B1WKDJJ5bmM3

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks