General

  • Target

    tmp

  • Size

    701KB

  • Sample

    230317-rhbazsgf37

  • MD5

    8464e5ded61cc6085adeb10e81fc6483

  • SHA1

    f028454b3e57fed009783c737497983b929fad85

  • SHA256

    39284637e45691feb034477cb6d51b662892a17b883ce42cee8d8e2fcdda4817

  • SHA512

    4261dd426d57e6085e52e4bcc4b12eb67927e72f227dab79d7e393e63a8c1ab9bcd9cea63915cad88d6417f268b12bef6dc8222c1e061bda4cdd03fb8c961d8e

  • SSDEEP

    12288:7C42YzjMYQo4AqrgGiG5Ni1vKkyg2BWRShmxP+BXXKPURUfhaDSwXXJGRTw:7C4z9boNe3RUM+BXrYHwHJT

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6041013494:AAH-I-5N7YCs5dQrpIdJ8toHohqsTM_GsfI/sendMessage?chat_id=6291600401

Targets

    • Target

      tmp

    • Size

      701KB

    • MD5

      8464e5ded61cc6085adeb10e81fc6483

    • SHA1

      f028454b3e57fed009783c737497983b929fad85

    • SHA256

      39284637e45691feb034477cb6d51b662892a17b883ce42cee8d8e2fcdda4817

    • SHA512

      4261dd426d57e6085e52e4bcc4b12eb67927e72f227dab79d7e393e63a8c1ab9bcd9cea63915cad88d6417f268b12bef6dc8222c1e061bda4cdd03fb8c961d8e

    • SSDEEP

      12288:7C42YzjMYQo4AqrgGiG5Ni1vKkyg2BWRShmxP+BXXKPURUfhaDSwXXJGRTw:7C4z9boNe3RUM+BXrYHwHJT

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks