General

  • Target

    0d0ecf6e8227884c8e139316d81fe46e.bin

  • Size

    856KB

  • Sample

    230301-bc1exsdh74

  • MD5

    76943d38601c967c4d600119fec20487

  • SHA1

    0e52519631107b31fb1f4e62e9abe17fa93f9427

  • SHA256

    6f04bd0f289ebf2274cb59e35dfdaf391ced46a082e0e89d52f336b835b1bdbd

  • SHA512

    6f31184399f6ba880f65e4486f6a21fd52b533b227b466f50b70686f2d99a9bd9590ec793572767d2b17060bf24e90ea1df9131479e801e71597c835720e8b52

  • SSDEEP

    12288:/tFqdAaHSRtSTYGPekd9jwE9k+P5tSO8XBYbO6rl+zxetCdunDPjh:/tFqJyWPekZwEa+P5tKGbOiEetUuB

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5253212199:AAG-02qWN77aEjxlYTZ-WAZ7WOi_I4kCde8/sendMessage?chat_id=2128925974

Targets

    • Target

      854F1E97-5DBB-4A87-A566-33D9012B05E2.pdf.exe

    • Size

      1.0MB

    • MD5

      792f5da3b111eeea5a28da52d0d40538

    • SHA1

      4c0ab6143d1eb5dc80b64f4f38b0dc6dce6b2152

    • SHA256

      0bcf67c52f7b210cc7a7bb304e66d221f49363e7e9e75d21f7eeab8355669e2f

    • SHA512

      f10cb56f555a9ba47ed67cf8da06278da98f48f47798776b7107f6324281fa2e304000a2d1963875c64082351ebf4c60909dcb09f15d9d8e05fa51c09596e8a1

    • SSDEEP

      24576:uwk1hdKvPA+FfKZcC39pcs3tiveXRAxz/j:Zk34w+FfKqC3MCIvmRKz/j

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks