General

  • Target

    Drawings.pif.exe

  • Size

    366KB

  • Sample

    231022-h8dpcsea9w

  • MD5

    1a691869fcecce8373212a390d1fa3e3

  • SHA1

    a952c873d4b825940b012e2d0ceb849dd9634d64

  • SHA256

    b423c0f05afa1b0e32ba18a552ac0d4020bb69a055602c94323d5bbd4c9cefa8

  • SHA512

    6bcac7d3fd19a60fb7c6a52d67cc0a6d8f7684f0a2fa428647a0cc1a03fb2d25c9a0b75b215de432df81113e951c2442ec1b793c93e68f6b99ae6ef7ba62fe5e

  • SSDEEP

    6144:L0nJBIKD2SJMz2dR8rZNlvzbV+dHhZdZcZmPaFTPM+OAHhBMdk6ceh9X3P9t0G:sJfD2S+nRbV+dHhZdZcZm2TPZHhBak6I

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6243209595:AAGECSmdSqJiVZcdFoBvotoaKcKT9Lz5Gvw/sendMessage?chat_id=1070926352

Targets

    • Target

      Drawings.pif.exe

    • Size

      366KB

    • MD5

      1a691869fcecce8373212a390d1fa3e3

    • SHA1

      a952c873d4b825940b012e2d0ceb849dd9634d64

    • SHA256

      b423c0f05afa1b0e32ba18a552ac0d4020bb69a055602c94323d5bbd4c9cefa8

    • SHA512

      6bcac7d3fd19a60fb7c6a52d67cc0a6d8f7684f0a2fa428647a0cc1a03fb2d25c9a0b75b215de432df81113e951c2442ec1b793c93e68f6b99ae6ef7ba62fe5e

    • SSDEEP

      6144:L0nJBIKD2SJMz2dR8rZNlvzbV+dHhZdZcZmPaFTPM+OAHhBMdk6ceh9X3P9t0G:sJfD2S+nRbV+dHhZdZcZm2TPZHhBak6I

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks