General

  • Target

    ARRIVAL NOTICE.exe

  • Size

    255KB

  • Sample

    230316-tglfnsbf49

  • MD5

    1473152426b25dc4d23b1ed6e8fbcc11

  • SHA1

    246061e73e8f99b214d8fe5934f33abbbfde3a02

  • SHA256

    063673e920d3daadc423a330055f7ed85d270311c5ef7f812e2f70dbdec562a7

  • SHA512

    e15862ef1c99bdc6a6212adfe5a5de278b8221cc7ec0c45354a70e14980082250d380fe3a808b69261ef1e8d3c9647aa3412294bbeef00579db144ec710d51a9

  • SSDEEP

    6144:/Ya6bOAbLzPXVFfarWQeC57Puvu4etjp3VzY7J0ZVU:/Y5OuLTVFyrWtquvuLlk0c

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6041013494:AAH-I-5N7YCs5dQrpIdJ8toHohqsTM_GsfI/sendMessage?chat_id=6291600401

Targets

    • Target

      ARRIVAL NOTICE.exe

    • Size

      255KB

    • MD5

      1473152426b25dc4d23b1ed6e8fbcc11

    • SHA1

      246061e73e8f99b214d8fe5934f33abbbfde3a02

    • SHA256

      063673e920d3daadc423a330055f7ed85d270311c5ef7f812e2f70dbdec562a7

    • SHA512

      e15862ef1c99bdc6a6212adfe5a5de278b8221cc7ec0c45354a70e14980082250d380fe3a808b69261ef1e8d3c9647aa3412294bbeef00579db144ec710d51a9

    • SSDEEP

      6144:/Ya6bOAbLzPXVFfarWQeC57Puvu4etjp3VzY7J0ZVU:/Y5OuLTVFyrWtquvuLlk0c

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks