General

  • Target

    2e1c49b731a484625f839fa31a6da8ff2da51b8d

  • Size

    1.2MB

  • Sample

    230106-xye7rsdh8y

  • MD5

    5f8ca23ce188123d138562e16dbc1f01

  • SHA1

    2e1c49b731a484625f839fa31a6da8ff2da51b8d

  • SHA256

    9a7a657e728c731ff69db20bfb86f32dea639d2020ed4415821161aced29f7b9

  • SHA512

    ac293f8ef341177449d2474b43f9e465c72ce2f69632efa6b6ed95e953fd1d8758cd8081142b9ad76ceda6e154b64f9d98a58ad9351f67fc207a556b9dc4ed25

  • SSDEEP

    24576:40oR2uCGoxHh79hDEiCYScLQotVPKUTyvWX1Qf+ceXj:uCGWF9hDE8F9pKUT3XTce

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5427131313:AAHLyTFmFK4eF7MFmUprVqnaYC6texltEAc/sendMessage?chat_id=5101192817

Targets

    • Target

      2e1c49b731a484625f839fa31a6da8ff2da51b8d

    • Size

      1.2MB

    • MD5

      5f8ca23ce188123d138562e16dbc1f01

    • SHA1

      2e1c49b731a484625f839fa31a6da8ff2da51b8d

    • SHA256

      9a7a657e728c731ff69db20bfb86f32dea639d2020ed4415821161aced29f7b9

    • SHA512

      ac293f8ef341177449d2474b43f9e465c72ce2f69632efa6b6ed95e953fd1d8758cd8081142b9ad76ceda6e154b64f9d98a58ad9351f67fc207a556b9dc4ed25

    • SSDEEP

      24576:40oR2uCGoxHh79hDEiCYScLQotVPKUTyvWX1Qf+ceXj:uCGWF9hDE8F9pKUT3XTce

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks