General

  • Target

    INV 002000-2023.exe

  • Size

    1.1MB

  • Sample

    230208-w4xhkadd6x

  • MD5

    e6a3824b28ef184b23ccca2f28dca151

  • SHA1

    b6bd15342f2842f7a27b96fced186c3fbe003daf

  • SHA256

    9eb40372237691f70f98fd3b46e040131d0e1144e62a79ce3709f4ed786907e0

  • SHA512

    26d6d5d5adfab6a89a9dba91cafabadfbe210fd635606a3b451eab089355335b85f027b148f092382f249c85cd3b8c16be31310957b078aaccd0bc55423dabe2

  • SSDEEP

    12288:1DdNuif+9gLHHPrpg6+R4cSbEX7ULxMtwprXauFRovStpBmfYx58QVC6gnu5242H:HNuiWGLHHPrpg6+R4K9gpgwoTnjBT

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5434559816:AAEK4UyY4a6PcJctHP2Ip_JJDu3VHM5TgBU/sendMessage?chat_id=935548406

Targets

    • Target

      INV 002000-2023.exe

    • Size

      1.1MB

    • MD5

      e6a3824b28ef184b23ccca2f28dca151

    • SHA1

      b6bd15342f2842f7a27b96fced186c3fbe003daf

    • SHA256

      9eb40372237691f70f98fd3b46e040131d0e1144e62a79ce3709f4ed786907e0

    • SHA512

      26d6d5d5adfab6a89a9dba91cafabadfbe210fd635606a3b451eab089355335b85f027b148f092382f249c85cd3b8c16be31310957b078aaccd0bc55423dabe2

    • SSDEEP

      12288:1DdNuif+9gLHHPrpg6+R4cSbEX7ULxMtwprXauFRovStpBmfYx58QVC6gnu5242H:HNuiWGLHHPrpg6+R4K9gpgwoTnjBT

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks