General

  • Target

    Belge.exe

  • Size

    905KB

  • Sample

    230330-ltx18sde7z

  • MD5

    2568de65fcdccbc160da2452452cbe09

  • SHA1

    38e434176706827e20a786de0bd656218005c9fb

  • SHA256

    559b97a856fca272b7f5891100f1317d5f4846d12e86d113c8334c9861e4b026

  • SHA512

    d0e05fda14e4b5ebb00dee9a0e965b7720b866393f022a452c29a10f75ad76c7e79bd4d16bc11319c658965c7843f3b15a33930c174a82ace144f105ac2496b3

  • SSDEEP

    12288:xk5+ytZpYWHE4SODt+cIpPrzh8x55thIimOMt+6I:xy+yyWk495+cIpPrzhethIimX3I

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5587666659:AAG8NrrXJQs__dhk8nLJBFOspz2my8OVpX0/sendMessage?chat_id=5569775004

Targets

    • Target

      Belge.exe

    • Size

      905KB

    • MD5

      2568de65fcdccbc160da2452452cbe09

    • SHA1

      38e434176706827e20a786de0bd656218005c9fb

    • SHA256

      559b97a856fca272b7f5891100f1317d5f4846d12e86d113c8334c9861e4b026

    • SHA512

      d0e05fda14e4b5ebb00dee9a0e965b7720b866393f022a452c29a10f75ad76c7e79bd4d16bc11319c658965c7843f3b15a33930c174a82ace144f105ac2496b3

    • SSDEEP

      12288:xk5+ytZpYWHE4SODt+cIpPrzh8x55thIimOMt+6I:xy+yyWk495+cIpPrzhethIimX3I

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks