General

  • Target

    9f7e4c0f47ffa44b03cc568541e5b1c5e2a1a2cbf8d30585129f11a5253ca20d.zip

  • Size

    677KB

  • Sample

    230321-r41srsde5y

  • MD5

    e11cea58cbc18045f1f94086b5fcd442

  • SHA1

    08dd3052cc67ccd1b68c9236a236998cc98abd1b

  • SHA256

    584fb6b46f6916da661e9f67768154428400af0134fa01d11142f2b4d5e6b303

  • SHA512

    ae8f3f8cad8d2e4c8ff871df7ac0335df1c092c09aa840d6a88de61ccd5260cd38e1cc0966566b3302b88bcf3e9d6cfc758c3b90bafb89a10e84d4ecc7da2de7

  • SSDEEP

    12288:3hJrE7Eu8cUxX+qixpRmz+JNEER/+izA8Cb3u3PlYTlVNZY4LYg058WTrxS/ezwW:3hFE7iPXIpRmq/EE3zAANYTlVHp2xS/A

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6011587164:AAE511fkFXh2HFxNMsjh7DJ7AykzyWIVuaY/sendMessage?chat_id=6197263581

Targets

    • Target

      9f7e4c0f47ffa44b03cc568541e5b1c5e2a1a2cbf8d30585129f11a5253ca20d.exe

    • Size

      744KB

    • MD5

      f99d5a071e38ed4add47c1d47f657422

    • SHA1

      94dbd1b97186229391c002d8f4b7aa1f65b386d4

    • SHA256

      9f7e4c0f47ffa44b03cc568541e5b1c5e2a1a2cbf8d30585129f11a5253ca20d

    • SHA512

      3031c8ba5236d04571a4849656c2d5ed5c54c18e98100beb91738b45f02332d60560aa42132be84b29d3598536d6b5472e3aa019c533a2029bd81fbe1a80647b

    • SSDEEP

      12288:gifU3XkzmeoZcEws6AVBYltazIYTX/5J3JFsjx+MNo91XIkrqQqtxPHEoqBChsMe:gOLzD6cEwHAValtazXb5FJCFjeyk1qtO

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks