General

  • Target

    DEKONT_001332597_06.11.2023 pdf.exe

  • Size

    44KB

  • Sample

    231106-vb858aeb49

  • MD5

    41bce404371579a1e6db304042d2e72e

  • SHA1

    55378787edb8d473893099cc206fd5554213caa9

  • SHA256

    ebb6fad910c99d151b30733b624e8f7e555eb7de7caaa66d65b9e7114c433f56

  • SHA512

    66e5e32da35d76208dac11bbfa8a232ab1d77f1d08ad377bbe04a33de395ff82248a82dc8f51df9d029ad461ebdb23300d0b549f2bf6149c1ff0b64cfb99af9c

  • SSDEEP

    768:DbynQEfPx5vJYrEXURJ5fTpSgKS08c9YDveruxPhreB3SUFjIHEIx:3ix7cEWZpSgKnUDGA6BZFmfx

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6350529534:AAEbFW9VBWTKQfN1Y3K_5RJARCtOn1UqK8o/sendMessage?chat_id=1467583453

Targets

    • Target

      DEKONT_001332597_06.11.2023 pdf.exe

    • Size

      44KB

    • MD5

      41bce404371579a1e6db304042d2e72e

    • SHA1

      55378787edb8d473893099cc206fd5554213caa9

    • SHA256

      ebb6fad910c99d151b30733b624e8f7e555eb7de7caaa66d65b9e7114c433f56

    • SHA512

      66e5e32da35d76208dac11bbfa8a232ab1d77f1d08ad377bbe04a33de395ff82248a82dc8f51df9d029ad461ebdb23300d0b549f2bf6149c1ff0b64cfb99af9c

    • SSDEEP

      768:DbynQEfPx5vJYrEXURJ5fTpSgKS08c9YDveruxPhreB3SUFjIHEIx:3ix7cEWZpSgKnUDGA6BZFmfx

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks