General

  • Target

    Ylvclgj.exe

  • Size

    22KB

  • Sample

    230929-ktnl5agh9x

  • MD5

    24726d59051982bcb1ded3daedaacb0b

  • SHA1

    fc2e317d419062860f98f3f0df2f95fcb5ce7718

  • SHA256

    99c5c57ec66db2b568df0891d6e8d4c6420e1bcd629ef55f7148659c9759e3eb

  • SHA512

    768d523fb9fbf5b44c8ae784c8525fb04a382fefaa2594a222ba5c44aae48023d7330e3e25e7bd238f31d6b4921931c276836dcf90fa43c5beaf752e306e502d

  • SSDEEP

    384:eU5ewSdw/L2APL6yRqtxAx+roEOsVK/KO+sB6fOK:FqwCs3RqtGx+roAYP+97

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6563963046:AAGlyBHZ_ALQCHnOUZcYa0FHqP2za43gVaM/sendMessage?chat_id=5262627523

Targets

    • Target

      Ylvclgj.exe

    • Size

      22KB

    • MD5

      24726d59051982bcb1ded3daedaacb0b

    • SHA1

      fc2e317d419062860f98f3f0df2f95fcb5ce7718

    • SHA256

      99c5c57ec66db2b568df0891d6e8d4c6420e1bcd629ef55f7148659c9759e3eb

    • SHA512

      768d523fb9fbf5b44c8ae784c8525fb04a382fefaa2594a222ba5c44aae48023d7330e3e25e7bd238f31d6b4921931c276836dcf90fa43c5beaf752e306e502d

    • SSDEEP

      384:eU5ewSdw/L2APL6yRqtxAx+roEOsVK/KO+sB6fOK:FqwCs3RqtGx+roAYP+97

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks