General

  • Target

    c895f5dae03d1e6030775e0161975b14

  • Size

    248KB

  • Sample

    240314-pcdg2sdh72

  • MD5

    c895f5dae03d1e6030775e0161975b14

  • SHA1

    18c28bce01ba6d6e3fce7bdf568baf302dac77df

  • SHA256

    db2ecbc435d932b7947857e4f9108ffe48c7a5af8ad9a34836c9d6cd96193ed0

  • SHA512

    5ebc550b39310edd80b58ceb155863044c34c569d9c223bc587aed150bc26d65ae7dfc9ce219ae4948fa5efb38abcb525702991e99f0690d4a01522ed55f371d

  • SSDEEP

    6144:AJHzPHIzMi9nhZpsdaisFaRdL5svoPYypqvj3jt27wl3Y:KTRdNo1ygj3s

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot1923344551:AAGJ9MeV4yHipzEdvvxVuepm8PFUNaCZez4/sendMessage?chat_id=1208289397

Targets

    • Target

      c895f5dae03d1e6030775e0161975b14

    • Size

      248KB

    • MD5

      c895f5dae03d1e6030775e0161975b14

    • SHA1

      18c28bce01ba6d6e3fce7bdf568baf302dac77df

    • SHA256

      db2ecbc435d932b7947857e4f9108ffe48c7a5af8ad9a34836c9d6cd96193ed0

    • SHA512

      5ebc550b39310edd80b58ceb155863044c34c569d9c223bc587aed150bc26d65ae7dfc9ce219ae4948fa5efb38abcb525702991e99f0690d4a01522ed55f371d

    • SSDEEP

      6144:AJHzPHIzMi9nhZpsdaisFaRdL5svoPYypqvj3jt27wl3Y:KTRdNo1ygj3s

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks