General

  • Target

    PO#00002.exe

  • Size

    888KB

  • Sample

    230208-lmm8fsaa33

  • MD5

    714041a2037e7f1219580c06465692f9

  • SHA1

    4b63229de681d770083b3d8a34e452e275293d72

  • SHA256

    4bfbab57c386a9e42854bbe2963e016025cdc68946c0915c425ba301662ce78b

  • SHA512

    ca41056258b269b2c1a01e5c0c8847cd624b9aec4fa0ee455e37b3646bad44ec07be5f03db65a174f4db6f61aef86b9a752297eebeb4936bd67f5d256c191535

  • SSDEEP

    24576:9jYClpDTpJwMYehLmYuGvk9ETwCdukNlp:KC7rwMYepnk9EdF

Malware Config

Extracted

Family

snakekeylogger

Credentials
C2

https://api.telegram.org/bot5416090806:AAHc_-eKh3y99r2PvkqkST8ViowHuAnB4Mo/sendMessage?chat_id=5402666401

Targets

    • Target

      PO#00002.exe

    • Size

      888KB

    • MD5

      714041a2037e7f1219580c06465692f9

    • SHA1

      4b63229de681d770083b3d8a34e452e275293d72

    • SHA256

      4bfbab57c386a9e42854bbe2963e016025cdc68946c0915c425ba301662ce78b

    • SHA512

      ca41056258b269b2c1a01e5c0c8847cd624b9aec4fa0ee455e37b3646bad44ec07be5f03db65a174f4db6f61aef86b9a752297eebeb4936bd67f5d256c191535

    • SSDEEP

      24576:9jYClpDTpJwMYehLmYuGvk9ETwCdukNlp:KC7rwMYepnk9EdF

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks