General

  • Target

    PO52024.PDF.ISO.bin

  • Size

    1.2MB

  • Sample

    230501-ywh2bagc96

  • MD5

    debf413ae7f7efac1f7d6c10aab16a82

  • SHA1

    2981389ba2f47c20d4a5f6b9b8b1b8768e7f36fd

  • SHA256

    4d63096c6cb556e2adbd6f5f398c5a53215a9e2b613316e7dc18d928c2333dfb

  • SHA512

    4d4fd97ac3b8e0057c30ad69461774784080ff78a1a40885ed7c8bd3864624682dfb5e47bfeacb3c3d176e62860c4a19144b9956436f965705f00b22c591936b

  • SSDEEP

    12288:c89eoUXN+8YnrVNwsfrT0hfp2X74sCzD8e4hTyOW:5UXN+8YrVNT02QzD+hTy

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5725545513:AAF0ULWHvMJTLlnqMYoWe0CkOpQ7zVO0wLI/sendMessage?chat_id=5738281136

Targets

    • Target

      PO52024.EXE

    • Size

      606KB

    • MD5

      42cf1acd0c33a70b1b4f55cf4c106a66

    • SHA1

      e3156b1d0f7c0c4ae7b5f24453a97b4c2f8cc3ad

    • SHA256

      9ad67bc90d52236a2893bad025077cb1f59ef0b059a0c1c4c95a803a3a3875ad

    • SHA512

      bb89dd0ebb2923fa559cb0b1490282c888ec4fcdb1a12ce2a7c5f74ceec44f964f9f5f0a38e151d68326cf3542e0a7a59d8dc54bea99a1ca4df65b3003fc69cc

    • SSDEEP

      12288:a89eoUXN+8YnrVNwsfrT0hfp2X74sCzD8e4hTyOW:DUXN+8YrVNT02QzD+hTy

    • Detects Redline Stealer samples

      This rule detects the presence of Redline Stealer samples based on their unique strings.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks