General

  • Target

    e65f08b40736f758fce94a376bd729405078ada67819af11c0e3b43150fd3be1.exe

  • Size

    388KB

  • Sample

    221222-cl7e9sdg33

  • MD5

    90b3a16a87cdbbe975cf2e854750d733

  • SHA1

    4af604fe2709a2ee7cf1edb46fbbf1b095368269

  • SHA256

    e65f08b40736f758fce94a376bd729405078ada67819af11c0e3b43150fd3be1

  • SHA512

    c170edb1aaa8fe39af665dcccae492d506e30e0852ed1facaafe7fb446c7ffef80ca316311458a19106f41e3cb29f3cfe20e44244a28aef61f558e50301756d5

  • SSDEEP

    6144:H2uManjSHj5nZnnJVBE0CMqT91ftDbO59AhxAel3zjm9:WuMan+Hj5ZnvqTJb89Ahx3l3z

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5971576384:AAF517SR8P0q91HBaBMVtLG-dJ7zvOsqfiM/sendMessage?chat_id=5816593523

Targets

    • Target

      e65f08b40736f758fce94a376bd729405078ada67819af11c0e3b43150fd3be1.exe

    • Size

      388KB

    • MD5

      90b3a16a87cdbbe975cf2e854750d733

    • SHA1

      4af604fe2709a2ee7cf1edb46fbbf1b095368269

    • SHA256

      e65f08b40736f758fce94a376bd729405078ada67819af11c0e3b43150fd3be1

    • SHA512

      c170edb1aaa8fe39af665dcccae492d506e30e0852ed1facaafe7fb446c7ffef80ca316311458a19106f41e3cb29f3cfe20e44244a28aef61f558e50301756d5

    • SSDEEP

      6144:H2uManjSHj5nZnnJVBE0CMqT91ftDbO59AhxAel3zjm9:WuMan+Hj5ZnvqTJb89Ahx3l3z

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks