General

  • Target

    77c8dfbd11944592367783ec9a9f0e40.exe

  • Size

    525KB

  • Sample

    230610-l3qzaaef32

  • MD5

    77c8dfbd11944592367783ec9a9f0e40

  • SHA1

    503fbea540adbb8822ee8231f672828b77a09d47

  • SHA256

    5d63464bad9316f6dea4ffbe71989d50626f8b209305a34a1db87e5e0c6d7dac

  • SHA512

    e5afe43ace447b18fc1809d4719a1a6c53b22c61278d6bb6e0b529ebd1f4925895e99eff974768c7a7c8ec36cba3e48f487704ebf64979055e52083953a9ab82

  • SSDEEP

    12288:p39P4Nd4c6Y3+hzEeuzWaH46noaSO0V9J:19P4Ndr6/hzEeuzWaH4uTSOG

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6215194475:AAG0v9XHc1z7f3mGswGN6a7WHknQv8IgUJg/sendMessage?chat_id=1467583453

Targets

    • Target

      77c8dfbd11944592367783ec9a9f0e40.exe

    • Size

      525KB

    • MD5

      77c8dfbd11944592367783ec9a9f0e40

    • SHA1

      503fbea540adbb8822ee8231f672828b77a09d47

    • SHA256

      5d63464bad9316f6dea4ffbe71989d50626f8b209305a34a1db87e5e0c6d7dac

    • SHA512

      e5afe43ace447b18fc1809d4719a1a6c53b22c61278d6bb6e0b529ebd1f4925895e99eff974768c7a7c8ec36cba3e48f487704ebf64979055e52083953a9ab82

    • SSDEEP

      12288:p39P4Nd4c6Y3+hzEeuzWaH46noaSO0V9J:19P4Ndr6/hzEeuzWaH4uTSOG

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks