General

  • Target

    file.exe

  • Size

    137KB

  • Sample

    230602-qthnrsbe95

  • MD5

    1ba7ea81ce6384aa8ce61f8295c5822a

  • SHA1

    82284495fdbd08fa814429cfede4ad5d7a413588

  • SHA256

    62e28e9fdfdefd8ba9053db4a21628873dbf8abaa58b35afe7ac5d43f552d22e

  • SHA512

    01465724031139a42929f758fe84d305aca6d556b05d5d40e2271de96f26306968bc8b99a9cc39c4291f564a192a9618bb29348f82e570711c2cae630ff16f06

  • SSDEEP

    3072:4hWH1chErLxYflYXp1Xz//OM94bon1UbzfEM+Xo78nT:e+chwVYUnT/TgonKbj+Xc

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6184780923:AAHbCGrBU_2zg9A-73yTyKKCMGf1tkzUFbM/sendMessage?chat_id=759814203

Targets

    • Target

      file.exe

    • Size

      137KB

    • MD5

      1ba7ea81ce6384aa8ce61f8295c5822a

    • SHA1

      82284495fdbd08fa814429cfede4ad5d7a413588

    • SHA256

      62e28e9fdfdefd8ba9053db4a21628873dbf8abaa58b35afe7ac5d43f552d22e

    • SHA512

      01465724031139a42929f758fe84d305aca6d556b05d5d40e2271de96f26306968bc8b99a9cc39c4291f564a192a9618bb29348f82e570711c2cae630ff16f06

    • SSDEEP

      3072:4hWH1chErLxYflYXp1Xz//OM94bon1UbzfEM+Xo78nT:e+chwVYUnT/TgonKbj+Xc

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Collection

Email Collection

1
T1114

Tasks