General

  • Target

    zwqzBp3lyu3UPYc.exe

  • Size

    662KB

  • Sample

    230505-zw448aef53

  • MD5

    665e0b39d01ec408f1e8f7fc1b2bec32

  • SHA1

    a42c424b54ac462f3158eff4b873bb0b0535d58f

  • SHA256

    15696d741a180dacb5b3bb87cad566b4f2ffca1df0a6673d03f9b40c71ea4def

  • SHA512

    bc225e25ab3f5c1621b3ce91372c811444e20777ada905079fb560c991fccee3a14f7887ac623c6bf89e0b88323588457a1aab1f1cd3662214bc686b05e7508e

  • SSDEEP

    12288:e7ni4IykaC+tMsWsNjQ9s+7LyW3avZPox1SumL:e7cd+tEqcLLyLhS1Sum

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5850516910:AAGFrVyywXI7npTHbZn_GIq2nguuXg2t7Lc/sendMessage?chat_id=5716598986

Targets

    • Target

      zwqzBp3lyu3UPYc.exe

    • Size

      662KB

    • MD5

      665e0b39d01ec408f1e8f7fc1b2bec32

    • SHA1

      a42c424b54ac462f3158eff4b873bb0b0535d58f

    • SHA256

      15696d741a180dacb5b3bb87cad566b4f2ffca1df0a6673d03f9b40c71ea4def

    • SHA512

      bc225e25ab3f5c1621b3ce91372c811444e20777ada905079fb560c991fccee3a14f7887ac623c6bf89e0b88323588457a1aab1f1cd3662214bc686b05e7508e

    • SSDEEP

      12288:e7ni4IykaC+tMsWsNjQ9s+7LyW3avZPox1SumL:e7cd+tEqcLLyLhS1Sum

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks