General

  • Target

    Ekstre.exe

  • Size

    1.3MB

  • Sample

    230510-m25lqahd6x

  • MD5

    076d5430af1ffea960bd52cfc641e99b

  • SHA1

    aba1bf8a90fabe96565ecec2022d24e34626a921

  • SHA256

    ee0fac5b1ab0a1e4c8efadea7919f8f1105d0928ca3a7c359a65af0246e06cf1

  • SHA512

    50966bf59360c3a6a52716e3bb63a5d91bad4bd208241431ed15107ba94f40b4a6790042e0839ec8d63a3c521242032ad374b7511b5aa194eff5b063226d38bd

  • SSDEEP

    24576:lTbBv5rUFcD6vbKBdqT4oDKvMrBW4eNTygt90e+hoyaxlI:PBH6vbKBUT4/vMr8jygt+0I

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5932548741:AAFytn5z9IUn93hcbUn3eb19fE08x1AWGz0/sendMessage?chat_id=5034680713

Targets

    • Target

      Ekstre.exe

    • Size

      1.3MB

    • MD5

      076d5430af1ffea960bd52cfc641e99b

    • SHA1

      aba1bf8a90fabe96565ecec2022d24e34626a921

    • SHA256

      ee0fac5b1ab0a1e4c8efadea7919f8f1105d0928ca3a7c359a65af0246e06cf1

    • SHA512

      50966bf59360c3a6a52716e3bb63a5d91bad4bd208241431ed15107ba94f40b4a6790042e0839ec8d63a3c521242032ad374b7511b5aa194eff5b063226d38bd

    • SSDEEP

      24576:lTbBv5rUFcD6vbKBdqT4oDKvMrBW4eNTygt90e+hoyaxlI:PBH6vbKBUT4/vMr8jygt+0I

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks