General

  • Target

    2dd2ecb8470da41499622db0c5ecc953.exe

  • Size

    1.1MB

  • Sample

    230323-gwjjeafh5z

  • MD5

    2dd2ecb8470da41499622db0c5ecc953

  • SHA1

    6d95773939219455665e6f9b49f4d0628f29791a

  • SHA256

    22b3c8355218fd0218d45ac51ac53e1322b54674e19bb8d428d8937e246dbb2a

  • SHA512

    155d6cb24038f33d8a5590132478fa4ae73334ed39a1bac9e15a5cf7bb85b8887ed74a97070d174d23adf367db86063aa1487324ff2811978d088d819bdb5c85

  • SSDEEP

    24576:tqGnNNycpUAELKV5UkvvWWJFVUkXO/8BOcpEujGRDyoM1iNT8Hs:UcpFE6WWJgkBMDyoWiQs

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5850516910:AAGFrVyywXI7npTHbZn_GIq2nguuXg2t7Lc/sendMessage?chat_id=5716598986

Targets

    • Target

      2dd2ecb8470da41499622db0c5ecc953.exe

    • Size

      1.1MB

    • MD5

      2dd2ecb8470da41499622db0c5ecc953

    • SHA1

      6d95773939219455665e6f9b49f4d0628f29791a

    • SHA256

      22b3c8355218fd0218d45ac51ac53e1322b54674e19bb8d428d8937e246dbb2a

    • SHA512

      155d6cb24038f33d8a5590132478fa4ae73334ed39a1bac9e15a5cf7bb85b8887ed74a97070d174d23adf367db86063aa1487324ff2811978d088d819bdb5c85

    • SSDEEP

      24576:tqGnNNycpUAELKV5UkvvWWJFVUkXO/8BOcpEujGRDyoM1iNT8Hs:UcpFE6WWJgkBMDyoWiQs

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks