General

  • Target

    b161be7554c0f571a5ae4db7a8c9ea60e7126c589339073b7c0aaacbd5679e9b.zip

  • Size

    541KB

  • Sample

    231119-z22laabf29

  • MD5

    32a8cbbd6c511801ab083e11a20e497e

  • SHA1

    c657fafd0e489062ac465c2cdfbc030267fe2952

  • SHA256

    b5c4a88587318ebe3e7342fd47879fbd7851130d7c81e15b2033f3a8a2f8a7e3

  • SHA512

    be29088a0feab079c39998c185761c5ecc0ed5fc0e171f5fba9910858b88d40444833116936ab0760d2f626f8d135c154249036beb09d3826edeb6439bc1e598

  • SSDEEP

    12288:7y+yXayeg/o3QNW9a/XdTlsdJFfouy/1zkjzpGpyG4DkFhPrnB:79yegnBdxIJFQXGjkyGvrnB

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6630888620:AAE93xtVx5O2Dxt-GABfyfFS0US096iv3q8/sendMessage?chat_id=1467583453

Targets

    • Target

      b161be7554c0f571a5ae4db7a8c9ea60e7126c589339073b7c0aaacbd5679e9b.exe

    • Size

      628KB

    • MD5

      c8fa93aa2b19901add93130d7e19ac8c

    • SHA1

      674ddfbbde28933ccd2c45192ab1fe864ce8fda8

    • SHA256

      b161be7554c0f571a5ae4db7a8c9ea60e7126c589339073b7c0aaacbd5679e9b

    • SHA512

      4aa0519657f0fc4589e25a0cfdf954782aa8c2b9f756655eb79f428350786f7a9492b8be979eb235010d3e6c8e2cd8b31adb8482e580e47b4752b6f087209b27

    • SSDEEP

      12288:0WOTNXc33HunBAFnS1GDtb7AufW1mIzAnf0EFQWhf3lnacr6aSTr:j3XuBqSOqNmIzAcEFdhf5a+

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks