General

  • Target

    3abcbfa68315356bb3ac3e2192eb011b

  • Size

    231KB

  • Sample

    231231-w1d7taeee2

  • MD5

    3abcbfa68315356bb3ac3e2192eb011b

  • SHA1

    fbbdeb1f4509a3f71e893b38cdd7eb194d256d2a

  • SHA256

    fbe0a40c3f902bd81e0835a454f3f929a89e4cac3c1439c77387f6d5ecc0d260

  • SHA512

    6c96fbe7250fef02565e4b2524333ad9941859af890fc87eafa01666aaca3f06866cccf4cd43e1bf477c92d7de1888e67d171e1b82e7d7f5a759021aa67bd03f

  • SSDEEP

    6144:ie/k+AoWDyYVdABdiUDeqB1p7JB4df6fNuoy0S7ubhN7EqD:ie/k+0DyaABdimBr78f6fNuoy0S7ubhd

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot1817928218:AAFcWGpfMsSiXXvCAylg0FnRVFlCr_5edUc/sendMessage?chat_id=1293496579

Targets

    • Target

      3abcbfa68315356bb3ac3e2192eb011b

    • Size

      231KB

    • MD5

      3abcbfa68315356bb3ac3e2192eb011b

    • SHA1

      fbbdeb1f4509a3f71e893b38cdd7eb194d256d2a

    • SHA256

      fbe0a40c3f902bd81e0835a454f3f929a89e4cac3c1439c77387f6d5ecc0d260

    • SHA512

      6c96fbe7250fef02565e4b2524333ad9941859af890fc87eafa01666aaca3f06866cccf4cd43e1bf477c92d7de1888e67d171e1b82e7d7f5a759021aa67bd03f

    • SSDEEP

      6144:ie/k+AoWDyYVdABdiUDeqB1p7JB4df6fNuoy0S7ubhN7EqD:ie/k+0DyaABdimBr78f6fNuoy0S7ubhd

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks