General

  • Target

    proformainvoiceexe.exe

  • Size

    150KB

  • Sample

    230704-repzzadg76

  • MD5

    0159cbc7fb49f61e2a46b998cf49cd3c

  • SHA1

    c26b23ec7aa5e097e9be39319d474a86580a038a

  • SHA256

    074f4cf5b5fa0260e1fc48c591ee900246aa3cc382e3019c55cde7aea428b508

  • SHA512

    156f63efd2a8e815de3cfe61dda17462ef365382b283a7ae0f83a6e40482ff0448717c25924e691d5f7de960830120aa81f0e55fdc12d664a15283244643b723

  • SSDEEP

    3072:HfY/TU9fE9PEtuBbVChm2hJerF6QMznvEgXlvvdGGVCmfe91X+jcHLTngg6:/Ya6PViy6QMzn8KtECdU1Xecrj96

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot1507062795:AAEBb0H5OYbp-dWwXk8ffQp0InjOhKxhpbU/sendMessage?chat_id=1663822858

Targets

    • Target

      proformainvoiceexe.exe

    • Size

      150KB

    • MD5

      0159cbc7fb49f61e2a46b998cf49cd3c

    • SHA1

      c26b23ec7aa5e097e9be39319d474a86580a038a

    • SHA256

      074f4cf5b5fa0260e1fc48c591ee900246aa3cc382e3019c55cde7aea428b508

    • SHA512

      156f63efd2a8e815de3cfe61dda17462ef365382b283a7ae0f83a6e40482ff0448717c25924e691d5f7de960830120aa81f0e55fdc12d664a15283244643b723

    • SSDEEP

      3072:HfY/TU9fE9PEtuBbVChm2hJerF6QMznvEgXlvvdGGVCmfe91X+jcHLTngg6:/Ya6PViy6QMzn8KtECdU1Xecrj96

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks