General

  • Target

    OZJa.exe

  • Size

    458KB

  • Sample

    231120-vf5zcsaa5v

  • MD5

    f764395a696a4dd4b3a010d6bc8208ea

  • SHA1

    22c55366e50f18902f2a4c3a6237b6fa42b1a744

  • SHA256

    a1d7f17262e1ea8bcc8e1095b93d4203b9007cda54e752205b9358c01cf1c0ed

  • SHA512

    2517f0c0d237ec5e9d83254f3980bd7ee17955dbb4027c459e3b4a6c635139bf6ef93ba22bb3c979d76e3008b469a4babf2c419037f1e0f55647723caa912f45

  • SSDEEP

    12288:VvCeU1SvZ951WVDFRWFpNRo5e3g7DvV44r96+tGB:VqeU14/OVfWFpHo5N7Dvm4r/tG

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6735527834:AAH3PffzMarE3Ys8tyS4SQ0IBXrHFKmsmnQ/sendMessage?chat_id=6692536703

Targets

    • Target

      OZJa.exe

    • Size

      458KB

    • MD5

      f764395a696a4dd4b3a010d6bc8208ea

    • SHA1

      22c55366e50f18902f2a4c3a6237b6fa42b1a744

    • SHA256

      a1d7f17262e1ea8bcc8e1095b93d4203b9007cda54e752205b9358c01cf1c0ed

    • SHA512

      2517f0c0d237ec5e9d83254f3980bd7ee17955dbb4027c459e3b4a6c635139bf6ef93ba22bb3c979d76e3008b469a4babf2c419037f1e0f55647723caa912f45

    • SSDEEP

      12288:VvCeU1SvZ951WVDFRWFpNRo5e3g7DvV44r96+tGB:VqeU14/OVfWFpHo5N7Dvm4r/tG

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks