General

  • Target

    RFQ000423 - Mouwasat Project_1.rar

  • Size

    555KB

  • Sample

    230426-saf2yaaa52

  • MD5

    cedf6e86a11d28e008a0c975d62efde1

  • SHA1

    2a77f4c367bb774bc7efbc72fa6b83c1b5c27d1e

  • SHA256

    8f8b5c4f07f3a5ea0d3c37bcfbd9e071679796df2041307bbb62430833c1b994

  • SHA512

    bd9377320ce78131f8f8847485e9491c2fbdce2489f9bd7f8d6cfe5694662a7381eec2c2bc06a61728a9a0b35bab3357983f1fbf6303f0850180fd16f47762d9

  • SSDEEP

    12288:S1GAhUfEHpS5bbUKFKae2AE2F+6k54pgz0qr2m3NQKTspc:S17uEg5bbU52RHipgxX3NQKApc

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5300146648:AAHnGWyIYhkCfGzD7b3SfmLZj94Y8lXxD90/sendMessage?chat_id=5116181161

Targets

    • Target

      RFQ000423 - Mouwasat Project.exe

    • Size

      797KB

    • MD5

      f88493d5d23ff210718dac650c188c0a

    • SHA1

      50956790269ef2d3aade78fffc841ce9b15e2bcc

    • SHA256

      d4086b64b176925017dd2db176cb3754e172bcec944037e1f3ea53ce48c1303f

    • SHA512

      48e97dd7921ee9549c58b1f566f75d0dd4f5f9f9cfd5e0f69701f02fd946bff4add2a2cc9cce112f30484c917d7c4d2082f7a48ee3468168e14bc8f0f34a64a2

    • SSDEEP

      12288:f6/9WflU/9gqbQP1BoHmSPrTb0aPHeo/n8hAI:SylUxk1BwmcrTQaPHT/n4

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks