General

  • Target

    b161be7554c0f571a5ae4db7a8c9ea60e7126c589339073b7c0aaacbd5679e9b.zip

  • Size

    541KB

  • Sample

    231119-zjg4xsbd62

  • MD5

    600e5034ead61aa91483056682a65405

  • SHA1

    9b0b165f5d5099044e98e534ad738e083b9ecdd7

  • SHA256

    233267ab534ad841ce8c0383d73d798edfc2caa415e4a08ba2c8b7f615449815

  • SHA512

    d6d034a22a46f0703c78160ece9883c54d3eb52721f4524542df68058e0705a8f3669b7f76606c51886d4a548a6fbc41b6f795d3a24929ee3bd8ad022cf5c74e

  • SSDEEP

    12288:RAEmfa0MOEsyM/lP9CoEMhmpGwGzexZTXT6khJzUdJn:REfav90/ColhSGwGzOgkhF8Jn

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6630888620:AAE93xtVx5O2Dxt-GABfyfFS0US096iv3q8/sendMessage?chat_id=1467583453

Targets

    • Target

      b161be7554c0f571a5ae4db7a8c9ea60e7126c589339073b7c0aaacbd5679e9b.exe

    • Size

      628KB

    • MD5

      c8fa93aa2b19901add93130d7e19ac8c

    • SHA1

      674ddfbbde28933ccd2c45192ab1fe864ce8fda8

    • SHA256

      b161be7554c0f571a5ae4db7a8c9ea60e7126c589339073b7c0aaacbd5679e9b

    • SHA512

      4aa0519657f0fc4589e25a0cfdf954782aa8c2b9f756655eb79f428350786f7a9492b8be979eb235010d3e6c8e2cd8b31adb8482e580e47b4752b6f087209b27

    • SSDEEP

      12288:0WOTNXc33HunBAFnS1GDtb7AufW1mIzAnf0EFQWhf3lnacr6aSTr:j3XuBqSOqNmIzAcEFdhf5a+

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks