General

  • Target

    915bf45c516f6cf10dec4441b47efb8ce11bd3db44569521e98912fe7d839f99

  • Size

    497KB

  • Sample

    221125-kg2m8adh85

  • MD5

    7dd5da0fe50d0c14b4bd2f4ae265e34e

  • SHA1

    82f5595d0c3d61c80eba41e9da640b8e7d7d7ca2

  • SHA256

    915bf45c516f6cf10dec4441b47efb8ce11bd3db44569521e98912fe7d839f99

  • SHA512

    09c0438b0fab4c6a81781b0099101815d4f3403f412bc726107980b58d16230c273a4e8202c39f9d2f4f2b689322d1daa352088cf8b5c3f86fb56b0d4a098ae7

  • SSDEEP

    6144:oSDMpra6/Ri8nfqYo7Xxp9WGQeg8bhI5PPL14:Kp1Ji8fRyB7WE2L1

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot1335107831:AAGZPoo67JukV78LJI16BeQqy3whx-zI59g/sendMessage?chat_id=1294593001

Targets

    • Target

      915bf45c516f6cf10dec4441b47efb8ce11bd3db44569521e98912fe7d839f99

    • Size

      497KB

    • MD5

      7dd5da0fe50d0c14b4bd2f4ae265e34e

    • SHA1

      82f5595d0c3d61c80eba41e9da640b8e7d7d7ca2

    • SHA256

      915bf45c516f6cf10dec4441b47efb8ce11bd3db44569521e98912fe7d839f99

    • SHA512

      09c0438b0fab4c6a81781b0099101815d4f3403f412bc726107980b58d16230c273a4e8202c39f9d2f4f2b689322d1daa352088cf8b5c3f86fb56b0d4a098ae7

    • SSDEEP

      6144:oSDMpra6/Ri8nfqYo7Xxp9WGQeg8bhI5PPL14:Kp1Ji8fRyB7WE2L1

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Email Collection

1
T1114

Tasks