General

  • Target

    PO YDTGHRTCG.exe

  • Size

    587KB

  • Sample

    230421-szkfnagd53

  • MD5

    056bbe48688212700c08b0cef11e41be

  • SHA1

    ef7864d95657c2f4566dace5cf382ce3a3829699

  • SHA256

    fa0347649fd59361aabea1d68c50b40bfca3835543cbf43620ee8e44f7214d5e

  • SHA512

    602566df8dac33ed4062162ff62ed130703168eb2cac34e26d4f71288ae74bdede465854bf6573c15174c5a0ea9931d639f16feb0f5815a58b3c2c9d771502b3

  • SSDEEP

    6144:MiknabTyYwDAEWEtc7aeT+7tN3Fu/OxAPZl7it9Xf8vC0uJlLsZRFJKv0ND:SnuuYwUEWqXeaZ1FBxAPLWrbJAFK0

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5818680343:AAGVJsfIHcopySiifMCdAaFCv-ICp2_Yo_M/sendMessage?chat_id=5765702254

Targets

    • Target

      PO YDTGHRTCG.exe

    • Size

      587KB

    • MD5

      056bbe48688212700c08b0cef11e41be

    • SHA1

      ef7864d95657c2f4566dace5cf382ce3a3829699

    • SHA256

      fa0347649fd59361aabea1d68c50b40bfca3835543cbf43620ee8e44f7214d5e

    • SHA512

      602566df8dac33ed4062162ff62ed130703168eb2cac34e26d4f71288ae74bdede465854bf6573c15174c5a0ea9931d639f16feb0f5815a58b3c2c9d771502b3

    • SSDEEP

      6144:MiknabTyYwDAEWEtc7aeT+7tN3Fu/OxAPZl7it9Xf8vC0uJlLsZRFJKv0ND:SnuuYwUEWqXeaZ1FBxAPLWrbJAFK0

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks