General

  • Target

    Dekont.pdf.exe

  • Size

    1.0MB

  • Sample

    230309-qb37racd98

  • MD5

    67094c96aaf5c057e57a2e709fa7fc89

  • SHA1

    11798292f663a7c3313542dffe21cbb0ecab3c6f

  • SHA256

    ecadf3a82456432d82fb7e6ce72761aa85253bff9e17d6ae25566132620a280c

  • SHA512

    687d3a08ba45055f29ec03ef6b66edc61623bc1c7e1e710762fc9ceeedcbf03debf6f726fada18e0fe4a0e8a3f9fa6bcad9363c1921a49580cad065e5ca581e3

  • SSDEEP

    24576:NuOZ6wGkB+e9uf8mSR+aK7CZdWrlB7YDCpoj0O:UA1ICakqoj0O

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5253212199:AAG-02qWN77aEjxlYTZ-WAZ7WOi_I4kCde8/sendMessage?chat_id=2128925974

Targets

    • Target

      Dekont.pdf.exe

    • Size

      1.0MB

    • MD5

      67094c96aaf5c057e57a2e709fa7fc89

    • SHA1

      11798292f663a7c3313542dffe21cbb0ecab3c6f

    • SHA256

      ecadf3a82456432d82fb7e6ce72761aa85253bff9e17d6ae25566132620a280c

    • SHA512

      687d3a08ba45055f29ec03ef6b66edc61623bc1c7e1e710762fc9ceeedcbf03debf6f726fada18e0fe4a0e8a3f9fa6bcad9363c1921a49580cad065e5ca581e3

    • SSDEEP

      24576:NuOZ6wGkB+e9uf8mSR+aK7CZdWrlB7YDCpoj0O:UA1ICakqoj0O

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks