General

  • Target

    Payment.exe

  • Size

    947KB

  • Sample

    221220-bnyqgage43

  • MD5

    7084794e65207923c736c1e55e87abb8

  • SHA1

    cd657ba0e8442abe779fc7db5a63d502b6ef162e

  • SHA256

    34b91aa79335759905f9405680460480b9d3a759c32e972192c0e6c41f3d7c36

  • SHA512

    b03c499251d5739b1a5d05aea6e59a55432cbbd10034180814d1756d649f94aaead241e0dd91edd456a595108e5fb002ef3ccdd3eeabd5d16ec1e53256af8025

  • SSDEEP

    12288:UaXrxR6wz8NxSN2iNXHoHymQSi9rMebjjnk5X:dXrzB1ZH2yRrjjn

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5484820495:AAGEjy8dT72vJZImmHLmeh3onMuG9LLRD5A/sendMessage?chat_id=5101327412

Targets

    • Target

      Payment.exe

    • Size

      947KB

    • MD5

      7084794e65207923c736c1e55e87abb8

    • SHA1

      cd657ba0e8442abe779fc7db5a63d502b6ef162e

    • SHA256

      34b91aa79335759905f9405680460480b9d3a759c32e972192c0e6c41f3d7c36

    • SHA512

      b03c499251d5739b1a5d05aea6e59a55432cbbd10034180814d1756d649f94aaead241e0dd91edd456a595108e5fb002ef3ccdd3eeabd5d16ec1e53256af8025

    • SSDEEP

      12288:UaXrxR6wz8NxSN2iNXHoHymQSi9rMebjjnk5X:dXrzB1ZH2yRrjjn

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks