General

  • Target

    2187a019e706bbd61c23e8bb6e8c52d7.bin

  • Size

    276KB

  • Sample

    230302-bd6ckaah58

  • MD5

    58f3c00225a143d064c8e11ff6e04dfc

  • SHA1

    974aae63b4f816b692789912c9569134ef760345

  • SHA256

    764f315bc712165766db3ca0246504b88ea0d7d19186be356e14ce13372542e4

  • SHA512

    d5ea3569a8a8a1cb48c03c1b07b82ee5416c2c0a628af31df9dc75e728b53b5a5adc201415961af5542f263d7026100c3efb4d4df2e8920b455ca840ce5c752d

  • SSDEEP

    6144:OxAgmC5ycPuipd6M/bDxBuOTU+XL0vdGWinBGhmrTxJCDyi6a8:KQcPuO6MPuOvgvde3TxJkyi6f

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5972904963:AAH_L0Z1BaWpBDyPhmUAMb5yVXWF00k11jk/sendMessage?chat_id=5334267822

Targets

    • Target

      4ab558181de9bd2dd00dc75eb66840c18c9243c62d72ee90d4e037d9be472721.exe

    • Size

      291KB

    • MD5

      2187a019e706bbd61c23e8bb6e8c52d7

    • SHA1

      c6de153270978951a9583b5cf53f76f14a1d6392

    • SHA256

      4ab558181de9bd2dd00dc75eb66840c18c9243c62d72ee90d4e037d9be472721

    • SHA512

      f7035b25e8f028785042636a9824d74c5fdd82075cfa537ff36effbba6a850d3206d13c93923f6b5225aa44655685e4d1e1ca4f6da18132130860a9ffae6e2b3

    • SSDEEP

      6144:9Ya6bgG4b0kMEMSz1RMxASpy6xLfkMGC1rEwZzFCuwyIJSm:9YF1AHHzXMPpy2LfUC1JpFkD

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks