General

  • Target

    doc-file001.exe

  • Size

    443KB

  • Sample

    230505-ngklgshg35

  • MD5

    89eb31c562df76938824479d9d5dba79

  • SHA1

    d33bbfeaeee240750c26a5f56aaa26d70ffec8ac

  • SHA256

    5e8cf27b727d949ee81c63189ff3a7f4137ecddff9a449e0889d78c16e55d13c

  • SHA512

    301d281ba18f00516697552731b74fa16c69f283dff6c61c298523a59d9744852d7a327815315468159a206528d675202d635576a2f6654ab9638dd479cfc9bd

  • SSDEEP

    12288:ITmgp57gEMX668YM2KGgQeq31apMciv6nnjqKoe:IfK6q/v6nnjqKoe

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6296181609:AAGAOhYH-dkTEQqHw-rWHbkpGOeR4Z7OA18/sendMessage?chat_id=1760125104

Targets

    • Target

      doc-file001.exe

    • Size

      443KB

    • MD5

      89eb31c562df76938824479d9d5dba79

    • SHA1

      d33bbfeaeee240750c26a5f56aaa26d70ffec8ac

    • SHA256

      5e8cf27b727d949ee81c63189ff3a7f4137ecddff9a449e0889d78c16e55d13c

    • SHA512

      301d281ba18f00516697552731b74fa16c69f283dff6c61c298523a59d9744852d7a327815315468159a206528d675202d635576a2f6654ab9638dd479cfc9bd

    • SSDEEP

      12288:ITmgp57gEMX668YM2KGgQeq31apMciv6nnjqKoe:IfK6q/v6nnjqKoe

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks