General

  • Target

    bb45f1bdc9fe6babe14afc4c9cd060c5

  • Size

    418KB

  • Sample

    231220-q1ynkaabbj

  • MD5

    bb45f1bdc9fe6babe14afc4c9cd060c5

  • SHA1

    4ba0d55837412391aa005ee84293c4319308e24c

  • SHA256

    601f5c6aca3e36d0b443c83549e7cd373701647db9509d0a8ac0f7e845e02b10

  • SHA512

    cbc2795cf8858e123370c4426c129b6a2f2850fa028fc4ef907c5de0ae1507402b26e48f672ac97f151e8f32c136ea77354f34e543395b12e3699863bed19207

  • SSDEEP

    6144:QoUc5bl1Fm5TxD2IQga8schzTsMS84AsMkhBW6YB:QoF5jFmdF27rSSMx4YSBWD

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot1620445910:AAF2v81NoINJsu_XXnpGet1YDm-NxnznaIE/sendMessage?chat_id=1063661839

Targets

    • Target

      bb45f1bdc9fe6babe14afc4c9cd060c5

    • Size

      418KB

    • MD5

      bb45f1bdc9fe6babe14afc4c9cd060c5

    • SHA1

      4ba0d55837412391aa005ee84293c4319308e24c

    • SHA256

      601f5c6aca3e36d0b443c83549e7cd373701647db9509d0a8ac0f7e845e02b10

    • SHA512

      cbc2795cf8858e123370c4426c129b6a2f2850fa028fc4ef907c5de0ae1507402b26e48f672ac97f151e8f32c136ea77354f34e543395b12e3699863bed19207

    • SSDEEP

      6144:QoUc5bl1Fm5TxD2IQga8schzTsMS84AsMkhBW6YB:QoF5jFmdF27rSSMx4YSBWD

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks