General

  • Target

    368-66-0x00000000003E0000-0x0000000000406000-memory.dmp

  • Size

    152KB

  • Sample

    230211-lgmpqsea35

  • MD5

    39592e2d4bf15dd633d0290ee12c542c

  • SHA1

    a8313c27b5fc5846e7f6491edab9acde0532bfab

  • SHA256

    7e8dfb6e86af9555f323a24d94d35333387dcb3ce0cc86625803f3c3d82c6ce6

  • SHA512

    1e754bb2d1d5fe26331a165288ec9e9fc7aac3677508690e1d2bd6e56539a8c59cdaf03e11eb36521cd8709823f2bd0f33eff7fa169c684f76289db96f4c1d06

  • SSDEEP

    3072:lAgAEcCv/IgOYrvQ6pGNF5b8Q4wwBWjO/FbYYqqu:OFyI69pkF5bVOtbUN

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6155153237:AAHwniNOLh5IeMqe3WWu52NIjrXAphPX4U4/sendMessage?chat_id=5463149861

Targets

    • Target

      368-66-0x00000000003E0000-0x0000000000406000-memory.dmp

    • Size

      152KB

    • MD5

      39592e2d4bf15dd633d0290ee12c542c

    • SHA1

      a8313c27b5fc5846e7f6491edab9acde0532bfab

    • SHA256

      7e8dfb6e86af9555f323a24d94d35333387dcb3ce0cc86625803f3c3d82c6ce6

    • SHA512

      1e754bb2d1d5fe26331a165288ec9e9fc7aac3677508690e1d2bd6e56539a8c59cdaf03e11eb36521cd8709823f2bd0f33eff7fa169c684f76289db96f4c1d06

    • SSDEEP

      3072:lAgAEcCv/IgOYrvQ6pGNF5b8Q4wwBWjO/FbYYqqu:OFyI69pkF5bVOtbUN

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks