General

  • Target

    PORTCLEARANCE.exe

  • Size

    483KB

  • Sample

    240801-zm2mqszhkg

  • MD5

    796dd3c159b5fb5ccf4ae2d577ebc488

  • SHA1

    246305c1cc97fdd095b51d685f0fd97f1696686c

  • SHA256

    8163c8e218f5715e35eddb8dc41327dd5e8ce77bb9652474692b5e72637129cf

  • SHA512

    a9deda5a1d0272db5ae50818f5299721783c2cd616163cd64869759c11e1d6d5c1b58b67e6d1b461fe5ca80aa07f08a37e6030436690d8de55b2923adaa67cd8

  • SSDEEP

    12288:y8G1KBsTF2SKM/GICWzXQvFrYV10bOnJf5SEXZovH5UP5:2YB2F2SRBzXKKr0b65SiZs5Ux

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7392028440:AAH-CFrJrFHkINZPUaSLV0ejLxfxxAvnqa0/sendMessage?chat_id=2135869667

Targets

    • Target

      PORTCLEARANCE.exe

    • Size

      483KB

    • MD5

      796dd3c159b5fb5ccf4ae2d577ebc488

    • SHA1

      246305c1cc97fdd095b51d685f0fd97f1696686c

    • SHA256

      8163c8e218f5715e35eddb8dc41327dd5e8ce77bb9652474692b5e72637129cf

    • SHA512

      a9deda5a1d0272db5ae50818f5299721783c2cd616163cd64869759c11e1d6d5c1b58b67e6d1b461fe5ca80aa07f08a37e6030436690d8de55b2923adaa67cd8

    • SSDEEP

      12288:y8G1KBsTF2SKM/GICWzXQvFrYV10bOnJf5SEXZovH5UP5:2YB2F2SRBzXKKr0b65SiZs5Ux

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks