General

  • Target

    07912499.exe

  • Size

    134KB

  • Sample

    230601-sd9teseh55

  • MD5

    fb08d5b98542effd996cf4dd0e388666

  • SHA1

    df1fa3681fa3508829ca60357e3ad86df7f488e6

  • SHA256

    21a26f3536172cb4f2f597eb7794578e7fda662d54d96e4e70da37a49348d454

  • SHA512

    558a338c8ca69149962ae37a670a822365789b5b277aaa8e1bb77d7254def3d3dbf513e3d7448fa3221e5b31efc2b9d72fab3675b5a67fa3d2875318b983c4a4

  • SSDEEP

    3072:VWhpKNbGL5ylAan+qHavsSHdUkFVgII4BWhf0ocPrr:VvNbGLVan+VvdHZLE2vr

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6184780923:AAHbCGrBU_2zg9A-73yTyKKCMGf1tkzUFbM/sendMessage?chat_id=759814203

Targets

    • Target

      07912499.exe

    • Size

      134KB

    • MD5

      fb08d5b98542effd996cf4dd0e388666

    • SHA1

      df1fa3681fa3508829ca60357e3ad86df7f488e6

    • SHA256

      21a26f3536172cb4f2f597eb7794578e7fda662d54d96e4e70da37a49348d454

    • SHA512

      558a338c8ca69149962ae37a670a822365789b5b277aaa8e1bb77d7254def3d3dbf513e3d7448fa3221e5b31efc2b9d72fab3675b5a67fa3d2875318b983c4a4

    • SSDEEP

      3072:VWhpKNbGL5ylAan+qHavsSHdUkFVgII4BWhf0ocPrr:VvNbGLVan+VvdHZLE2vr

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Collection

Email Collection

1
T1114

Tasks