General

  • Target

    Nhuhqpc.exe

  • Size

    171KB

  • Sample

    231011-x9bzgsag23

  • MD5

    306561287324dcb749b051225c7ca686

  • SHA1

    715ac0c7eb48a0ff536be8c8e9cf16e3bb62e3cd

  • SHA256

    6caab57198e2e3cc5833f0b578e193c99230595f66ab98eb00f0fdae7d8c2c8a

  • SHA512

    578128194a04788bae0321645f8100a0216e801c1d60251b830add12f63f6feb4f0d562deea5cd64bbe453b744fa49590b514856613b2c3eaae167ea88575f43

  • SSDEEP

    1536:A1vldVVr/ETon7CdEZIPas6A5Adgl6nPUStsJhB9rMVcoXfRlXn:cYon7O/XigW6/wcoZl3

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6429805701:AAEngMg5r6ewcqgGwVjFKJpjYF7Sc8nwhxA/sendMessage?chat_id=5262627523

Targets

    • Target

      Nhuhqpc.exe

    • Size

      171KB

    • MD5

      306561287324dcb749b051225c7ca686

    • SHA1

      715ac0c7eb48a0ff536be8c8e9cf16e3bb62e3cd

    • SHA256

      6caab57198e2e3cc5833f0b578e193c99230595f66ab98eb00f0fdae7d8c2c8a

    • SHA512

      578128194a04788bae0321645f8100a0216e801c1d60251b830add12f63f6feb4f0d562deea5cd64bbe453b744fa49590b514856613b2c3eaae167ea88575f43

    • SSDEEP

      1536:A1vldVVr/ETon7CdEZIPas6A5Adgl6nPUStsJhB9rMVcoXfRlXn:cYon7O/XigW6/wcoZl3

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks