General

  • Target

    Airwaybill and Shipping Documents.exe

  • Size

    1.3MB

  • Sample

    230425-symjmabb32

  • MD5

    617789256861bff10285a69537dae7f4

  • SHA1

    76bdfb6df8a14e654654d52eddc768616e9702f3

  • SHA256

    7728135e7ed9dd45d6e34faf84fd68e3cb14f30f7e2a17724e8cb06d1bf0212a

  • SHA512

    0ddd43bb735680fc89d0ede6d2e5c945bf3f7122e41b02debc9e1715e518f226c28683c62e6df27d8967be213d9b0973bc680d6068c4698f0e5b2b87682f885f

  • SSDEEP

    24576:t1W+LlzLRXSargVFPwvMoKwGGZGHygUzYBHVNSD:/rLl/9DEwWS

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6184450589:AAFIdcqJgDnNznaPK_xiDFODq_veiD4WNMg/sendMessage?chat_id=1921763965

Targets

    • Target

      Airwaybill and Shipping Documents.exe

    • Size

      1.3MB

    • MD5

      617789256861bff10285a69537dae7f4

    • SHA1

      76bdfb6df8a14e654654d52eddc768616e9702f3

    • SHA256

      7728135e7ed9dd45d6e34faf84fd68e3cb14f30f7e2a17724e8cb06d1bf0212a

    • SHA512

      0ddd43bb735680fc89d0ede6d2e5c945bf3f7122e41b02debc9e1715e518f226c28683c62e6df27d8967be213d9b0973bc680d6068c4698f0e5b2b87682f885f

    • SSDEEP

      24576:t1W+LlzLRXSargVFPwvMoKwGGZGHygUzYBHVNSD:/rLl/9DEwWS

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks