General

  • Target

    a0b4a1c89699a189931bb1b43fa8e1bd.bin

  • Size

    622KB

  • Sample

    230602-cq2qkshd95

  • MD5

    ad71968a3c15e96aa91d78741dc4bbb9

  • SHA1

    47fd929831523edb3b58d265b01231acbc891f67

  • SHA256

    063e1cc314b56802b04f158b572eb82cc278103ce5945414c9f29bdad33b1c00

  • SHA512

    ac2ece25235910e2532ed0cdf2e7e2393e367ffa48a8a52ae8ecc4d3bd829117e3b06d26dd56a6f196095046a080eb1609fa43fd8fb62c2d287868cfcbbbd006

  • SSDEEP

    12288:GHPXmHfbBefPDgV14qbf0Q1jkJgl5yvmM4xwWsFnxrAjY3LPKKQZEzeZJ+z:qmHlefPEV14FSjkJm5yvqxIxrakKKexE

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5912270480:AAEIuGgw_K5xnaqTgAZTKLKuD8iAYrUMk6E/sendMessage?chat_id=5739567068

Targets

    • Target

      d26f10eaa0513aec677c5aa206d6f8165a311840264d33c2c21ca6a5fb1e59e6.exe

    • Size

      986KB

    • MD5

      a0b4a1c89699a189931bb1b43fa8e1bd

    • SHA1

      f51aafc55d19536b20eee1b046fd06a4e40ba322

    • SHA256

      d26f10eaa0513aec677c5aa206d6f8165a311840264d33c2c21ca6a5fb1e59e6

    • SHA512

      a51ee8fe52010caa5f8fc7583527c8b53fec4a79ec1fa6fe53b904baf252d8bb350fa1ce54cb529604a758703d0ac0cf1e47f8e559456b81f9aa5c8a8bf257da

    • SSDEEP

      12288:mfzAMTihh6xhZ6OrMHZ0RbPZoNgFI3q+HkSGKRpgTX7mR8qQHqPKuD:DMUgh8yS2PZ+g63hEpKREqFP

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Tasks