General

  • Target

    RE facturas 55-23-.exe

  • Size

    736KB

  • Sample

    230530-hn73gagb7y

  • MD5

    bfee2bc7e6193b914c419f6def71d567

  • SHA1

    5313ba5781a8bf704460f001d7bcdb6d7f37fa4f

  • SHA256

    308a5ed2f79e93b600af3147ea292f64636d31b858a27436d175b933400ead85

  • SHA512

    40625a0ceaaf9d04a084e5a137179a316aecd134615ed9d852dbf460dceae7d3f445ce7c03aa74a275449109746ce6dff94df52514a0c4d2a12d1560b4fcab3c

  • SSDEEP

    12288:Z3ZbakH2iNfmFx2iqNhujGjUDsBAYbXXVat+zVCrKrGdsuZhIOw3GyFjnEzFOz8/:Z3cs1lmFxUKsTVatN7yuZhSjEzFOz8

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5967839484:AAGJtiRve079uoreJ5X0WycNZ-zS90-jUJE/sendMessage?chat_id=5928418129

Targets

    • Target

      RE facturas 55-23-.exe

    • Size

      736KB

    • MD5

      bfee2bc7e6193b914c419f6def71d567

    • SHA1

      5313ba5781a8bf704460f001d7bcdb6d7f37fa4f

    • SHA256

      308a5ed2f79e93b600af3147ea292f64636d31b858a27436d175b933400ead85

    • SHA512

      40625a0ceaaf9d04a084e5a137179a316aecd134615ed9d852dbf460dceae7d3f445ce7c03aa74a275449109746ce6dff94df52514a0c4d2a12d1560b4fcab3c

    • SSDEEP

      12288:Z3ZbakH2iNfmFx2iqNhujGjUDsBAYbXXVat+zVCrKrGdsuZhIOw3GyFjnEzFOz8/:Z3cs1lmFxUKsTVatN7yuZhSjEzFOz8

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks