General

  • Target

    Dekont.pdf.exe

  • Size

    628KB

  • Sample

    231113-t5ye5sdh6x

  • MD5

    c8fa93aa2b19901add93130d7e19ac8c

  • SHA1

    674ddfbbde28933ccd2c45192ab1fe864ce8fda8

  • SHA256

    b161be7554c0f571a5ae4db7a8c9ea60e7126c589339073b7c0aaacbd5679e9b

  • SHA512

    4aa0519657f0fc4589e25a0cfdf954782aa8c2b9f756655eb79f428350786f7a9492b8be979eb235010d3e6c8e2cd8b31adb8482e580e47b4752b6f087209b27

  • SSDEEP

    12288:0WOTNXc33HunBAFnS1GDtb7AufW1mIzAnf0EFQWhf3lnacr6aSTr:j3XuBqSOqNmIzAcEFdhf5a+

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6630888620:AAE93xtVx5O2Dxt-GABfyfFS0US096iv3q8/sendMessage?chat_id=1467583453

Targets

    • Target

      Dekont.pdf.exe

    • Size

      628KB

    • MD5

      c8fa93aa2b19901add93130d7e19ac8c

    • SHA1

      674ddfbbde28933ccd2c45192ab1fe864ce8fda8

    • SHA256

      b161be7554c0f571a5ae4db7a8c9ea60e7126c589339073b7c0aaacbd5679e9b

    • SHA512

      4aa0519657f0fc4589e25a0cfdf954782aa8c2b9f756655eb79f428350786f7a9492b8be979eb235010d3e6c8e2cd8b31adb8482e580e47b4752b6f087209b27

    • SSDEEP

      12288:0WOTNXc33HunBAFnS1GDtb7AufW1mIzAnf0EFQWhf3lnacr6aSTr:j3XuBqSOqNmIzAcEFdhf5a+

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks