General

  • Target

    18F5EA9F593E2F2E062123BF10FDCD8D7895D1997C10F8DC96A111E0A49E0059

  • Size

    461KB

  • Sample

    230518-cfes3ahc38

  • MD5

    66786d1fa02ccace718078783db29722

  • SHA1

    dc6fedd3d0c2e8cf1e42d12437e8554aec18d437

  • SHA256

    18f5ea9f593e2f2e062123bf10fdcd8d7895d1997c10f8dc96a111e0a49e0059

  • SHA512

    3c5180cd84c2f526497a9cc255049c75bbe05cf41db16d8cc7306a1a82099f22eb68dac7f02ab914c6ba26415dee3ba4cd686e4af1772b923410ef4774de8299

  • SSDEEP

    6144:3anVyGKfz3xJwfQ4eRO8nyaf3OYPhrl1U7GP6bfXw4IOHpweCBf5TnkRSOM8f4Dp:NjjwItYoPxPhrl1d6TXw1hDcd4

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5900175150:AAEOWcHfBC8E-MpCblgzLaTu6oAl9xGi2Nc/sendMessage?chat_id=6236888590

Targets

    • Target

      fatura_25148.exe

    • Size

      558KB

    • MD5

      0c6c529ac402229837a07c0d09d4b841

    • SHA1

      79e24c6f76464478bd88c45b0d0dd50296d5fd07

    • SHA256

      61242d372c2335940696dbf6d7ea85fbd95bd192d40a2e347faf43d9cbd04c82

    • SHA512

      2e34857f9c8826a97c1ccf444ff18f4952847201e1bda66b323c610abe359e1e4fb0eb90e8a1488459f7dc6186baef1b6f772ff5ebb9eea06b2cb4b8a165de50

    • SSDEEP

      6144:PYMbsEvycCJULPWzt7dfzWrrl1K7GPy9hXwCI8rpYeCBfPc7e51SLK1kF0mpk3A:PYov5+UzAWrrl1fyrXwb8QQe1kF0Ik3

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks