General

  • Target

    dosya.exe

  • Size

    1.2MB

  • Sample

    221031-qqnevabhbj

  • MD5

    66ee5c6449b10c07145513673b256d0e

  • SHA1

    ecd992ffd7b14dff20ab4c78834fb84755f94c74

  • SHA256

    8122adb4b9e54516cbcbd5329f729c63e5df60401f081e38bc770df930d277d1

  • SHA512

    d68c73931ce2baaebda5dec9cd74aa91096848f3024367d8cfe244afab617286710b41e5c2577a7d980086730da5e0741eb00b768c8d2fb028b7295a83bebab8

  • SSDEEP

    12288:qj4MroRUE5mJa7ps1dxk8i/whuJozps7pQcCxJo6H/OqOTu4tgOofj/gd5tl7Ebn:DR94o7MdxkouJgs71626PlzYd9+Os

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5310184099:AAGxqu0IL8tjOF6Eq6x2u0gfcHhvuxRwfLU/sendMessage?chat_id=5350445922

Targets

    • Target

      dosya.exe

    • Size

      1.2MB

    • MD5

      66ee5c6449b10c07145513673b256d0e

    • SHA1

      ecd992ffd7b14dff20ab4c78834fb84755f94c74

    • SHA256

      8122adb4b9e54516cbcbd5329f729c63e5df60401f081e38bc770df930d277d1

    • SHA512

      d68c73931ce2baaebda5dec9cd74aa91096848f3024367d8cfe244afab617286710b41e5c2577a7d980086730da5e0741eb00b768c8d2fb028b7295a83bebab8

    • SSDEEP

      12288:qj4MroRUE5mJa7ps1dxk8i/whuJozps7pQcCxJo6H/OqOTu4tgOofj/gd5tl7Ebn:DR94o7MdxkouJgs71626PlzYd9+Os

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks