General

  • Target

    tmp

  • Size

    901KB

  • Sample

    230323-l5vp9agh4t

  • MD5

    8301d3d1a602b5aa7e72a57fb20d1a57

  • SHA1

    0196e13d7e1ff5d71c994a70bc4585af52d890a0

  • SHA256

    ad58ce24f9e160b6ace93452b01909c30d77643dfd8445ef27d8862442455b03

  • SHA512

    2f99e3532af335c719100c12c0b67dc4ea507790c8fa17c8eea3a0dd10e6423f4be7a2eaddac2aa104f7ff62312036423b65d7ac5ffa57a6a870be6c2108e83a

  • SSDEEP

    12288:OQCP4MZ1sTrbQWyQtI1op/5yKeCxXCZJjc2ydiMq3xoVbEAvxiLATAGn3WtNmBNG:OQCgMXs/bHy7U/MDCFSo2bMaxoVbr

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6011587164:AAE511fkFXh2HFxNMsjh7DJ7AykzyWIVuaY/sendMessage?chat_id=6197263581

Targets

    • Target

      tmp

    • Size

      901KB

    • MD5

      8301d3d1a602b5aa7e72a57fb20d1a57

    • SHA1

      0196e13d7e1ff5d71c994a70bc4585af52d890a0

    • SHA256

      ad58ce24f9e160b6ace93452b01909c30d77643dfd8445ef27d8862442455b03

    • SHA512

      2f99e3532af335c719100c12c0b67dc4ea507790c8fa17c8eea3a0dd10e6423f4be7a2eaddac2aa104f7ff62312036423b65d7ac5ffa57a6a870be6c2108e83a

    • SSDEEP

      12288:OQCP4MZ1sTrbQWyQtI1op/5yKeCxXCZJjc2ydiMq3xoVbEAvxiLATAGn3WtNmBNG:OQCgMXs/bHy7U/MDCFSo2bMaxoVbr

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks