General

  • Target

    1ba7ea81ce6384aa8ce61f8295c5822a.bin

  • Size

    104KB

  • Sample

    230605-l9l9nsgd4y

  • MD5

    4efa49984aa0148cbc6de4cfe54f58f0

  • SHA1

    c7f74bc696758a78c9c8fa0ea4057191d6a32e64

  • SHA256

    6d37839c8dca16fbcef8644549c42e2ca0d08f1f860ffb61b62d770cadd1dc17

  • SHA512

    f8090d9a0d054a0c143d015176688dd611c5ddd04a5fe72d9aa8f31f261490ca4535b59d50c35769afa09adf66dc1e67b5150b607d79176868c7da79ce87678a

  • SSDEEP

    3072:NXK43I3UXDczshMqO9WrzdX+2hoG8GRihpliwQx:FK43XEsDOI3xhHsHLQx

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6184780923:AAHbCGrBU_2zg9A-73yTyKKCMGf1tkzUFbM/sendMessage?chat_id=759814203

Targets

    • Target

      62e28e9fdfdefd8ba9053db4a21628873dbf8abaa58b35afe7ac5d43f552d22e.exe

    • Size

      137KB

    • MD5

      1ba7ea81ce6384aa8ce61f8295c5822a

    • SHA1

      82284495fdbd08fa814429cfede4ad5d7a413588

    • SHA256

      62e28e9fdfdefd8ba9053db4a21628873dbf8abaa58b35afe7ac5d43f552d22e

    • SHA512

      01465724031139a42929f758fe84d305aca6d556b05d5d40e2271de96f26306968bc8b99a9cc39c4291f564a192a9618bb29348f82e570711c2cae630ff16f06

    • SSDEEP

      3072:4hWH1chErLxYflYXp1Xz//OM94bon1UbzfEM+Xo78nT:e+chwVYUnT/TgonKbj+Xc

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Collection

Email Collection

1
T1114

Tasks