General

  • Target

    b87ccb38d408270f66f79e7d0e9734b9.exe

  • Size

    126KB

  • Sample

    230505-xwd7paae5v

  • MD5

    b87ccb38d408270f66f79e7d0e9734b9

  • SHA1

    eb3f89cc8572d102931e2a4be4400178cf4ef8d3

  • SHA256

    7ad28fb37f9da0fde0ffb177a30906f48388e89e61ea5e8decb7e94e06661504

  • SHA512

    cf0fa28a217a1cda9d9ca9f06d73357f471b48f34d87f38c0df762e2f326f74eeadb263fdde4635c7af746fc6033c31a9fb122cdb1c55eaa1b5f9e41e6fc74af

  • SSDEEP

    1536:4tMpEvqHEIsang0ly+G0/nE+vBUFrlY9DZKkAMFFORnT/G22C7kbKuzPjaQlBUpx:4tMKHE/tDZvORT/G4Qbfrm4B+wBjFbY

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6029559841:AAEqr8_NCfqapJgAzw8PoPbqoCosnsk1VO0/sendMessage?chat_id=6033043077

Targets

    • Target

      b87ccb38d408270f66f79e7d0e9734b9.exe

    • Size

      126KB

    • MD5

      b87ccb38d408270f66f79e7d0e9734b9

    • SHA1

      eb3f89cc8572d102931e2a4be4400178cf4ef8d3

    • SHA256

      7ad28fb37f9da0fde0ffb177a30906f48388e89e61ea5e8decb7e94e06661504

    • SHA512

      cf0fa28a217a1cda9d9ca9f06d73357f471b48f34d87f38c0df762e2f326f74eeadb263fdde4635c7af746fc6033c31a9fb122cdb1c55eaa1b5f9e41e6fc74af

    • SSDEEP

      1536:4tMpEvqHEIsang0ly+G0/nE+vBUFrlY9DZKkAMFFORnT/G22C7kbKuzPjaQlBUpx:4tMKHE/tDZvORT/G4Qbfrm4B+wBjFbY

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks