General

  • Target

    a5a04ecdd8c1133d7cbe18a889b2c133.exe

  • Size

    1014KB

  • Sample

    230526-f51nlsdh73

  • MD5

    a5a04ecdd8c1133d7cbe18a889b2c133

  • SHA1

    36b91fb92b5dd3d3021d05a6f31fa209aacf5b23

  • SHA256

    9e8b3458e5a326cb4eec85e9d49536a0b4546e3226a7936cbc01a166bb238386

  • SHA512

    3371145af11f299bcf22cc025533e94c67fe8abee37245746d96b2e30d00ebeee013a912f440cf935f3764b72fef39f89db999adf1bd31eff5da75dc8d8a0d87

  • SSDEEP

    24576:+t+4ugP3pCe6rzYZyARFO1eMJ7GZivTgDx+nQ:p4jp16gOJyZwgD8nQ

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6069996781:AAHmYgsHwRzaV1_6EovGh5IzcjEeVnsIkLk/sendMessage?chat_id=1734299596

Targets

    • Target

      a5a04ecdd8c1133d7cbe18a889b2c133.exe

    • Size

      1014KB

    • MD5

      a5a04ecdd8c1133d7cbe18a889b2c133

    • SHA1

      36b91fb92b5dd3d3021d05a6f31fa209aacf5b23

    • SHA256

      9e8b3458e5a326cb4eec85e9d49536a0b4546e3226a7936cbc01a166bb238386

    • SHA512

      3371145af11f299bcf22cc025533e94c67fe8abee37245746d96b2e30d00ebeee013a912f440cf935f3764b72fef39f89db999adf1bd31eff5da75dc8d8a0d87

    • SSDEEP

      24576:+t+4ugP3pCe6rzYZyARFO1eMJ7GZivTgDx+nQ:p4jp16gOJyZwgD8nQ

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks