General

  • Target

    26ccb92135211217dce32c7b5dfd3af5.exe

  • Size

    205KB

  • Sample

    230211-kpwryaca86

  • MD5

    26ccb92135211217dce32c7b5dfd3af5

  • SHA1

    7f4b0b0ba631d57ce442a3f5470bda1920b621af

  • SHA256

    c256fc962fd5d733431d3132bbf60ee1b02d205825704e7bf660c3b39ceb1aa3

  • SHA512

    71c4b70671efebac280ffa0ae160ce86baa46b303187afff23c807c8c7c80aa6b1fb76d30abbbfdd1745f395e5711c6a419fcd9c0b61c4f344eea7087a1fa4dd

  • SSDEEP

    3072:GqqaM97eOTPiK3DruiiF/XbKjPk18lVAgAEzoHj/LDd280fqMlb8S2wBj2WFbYQ:VCteODDmzKR+aWVMlb72SbP

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5843567515:AAEdtJWwcJKNn64U81CKVdG-li_Ejds8raM/sendMessage?chat_id=1639214896

Targets

    • Target

      26ccb92135211217dce32c7b5dfd3af5.exe

    • Size

      205KB

    • MD5

      26ccb92135211217dce32c7b5dfd3af5

    • SHA1

      7f4b0b0ba631d57ce442a3f5470bda1920b621af

    • SHA256

      c256fc962fd5d733431d3132bbf60ee1b02d205825704e7bf660c3b39ceb1aa3

    • SHA512

      71c4b70671efebac280ffa0ae160ce86baa46b303187afff23c807c8c7c80aa6b1fb76d30abbbfdd1745f395e5711c6a419fcd9c0b61c4f344eea7087a1fa4dd

    • SSDEEP

      3072:GqqaM97eOTPiK3DruiiF/XbKjPk18lVAgAEzoHj/LDd280fqMlb8S2wBj2WFbYQ:VCteODDmzKR+aWVMlb72SbP

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks