General

  • Target

    b161be7554c0f571a5ae4db7a8c9ea60e7126c589339073b7c0aaacbd5679e9b.zip

  • Size

    541KB

  • Sample

    231119-2dzswscd45

  • MD5

    b7b23f287d06a4e0826b3760a3df4fec

  • SHA1

    9a3abe37ea88086b9818c90b66186ae2da4c78d7

  • SHA256

    3c9ce8f9ea12d33121cbed04a9cd55ace12062949b7bb3dafe37f1f0a55f1eff

  • SHA512

    518c80442809f0edf9e0ffcb3d345f07265a49dd0ed0a02fe5088f7c0af35e4f75ac493e0d10eef31651d75243da8cb8ec5e17b90ec6bf0b169d2f0e1b753c45

  • SSDEEP

    12288:eby/gskITBX/0W/0ZNNat32VqV2osNbSwgGLRPM7ChA6a6RYarFygeBx:Bn7BPv/8at2jf5Sw5tqp6t7oNX

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6630888620:AAE93xtVx5O2Dxt-GABfyfFS0US096iv3q8/sendMessage?chat_id=1467583453

Targets

    • Target

      b161be7554c0f571a5ae4db7a8c9ea60e7126c589339073b7c0aaacbd5679e9b.exe

    • Size

      628KB

    • MD5

      c8fa93aa2b19901add93130d7e19ac8c

    • SHA1

      674ddfbbde28933ccd2c45192ab1fe864ce8fda8

    • SHA256

      b161be7554c0f571a5ae4db7a8c9ea60e7126c589339073b7c0aaacbd5679e9b

    • SHA512

      4aa0519657f0fc4589e25a0cfdf954782aa8c2b9f756655eb79f428350786f7a9492b8be979eb235010d3e6c8e2cd8b31adb8482e580e47b4752b6f087209b27

    • SSDEEP

      12288:0WOTNXc33HunBAFnS1GDtb7AufW1mIzAnf0EFQWhf3lnacr6aSTr:j3XuBqSOqNmIzAcEFdhf5a+

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks