General

  • Target

    Scan00048585.exe

  • Size

    1.1MB

  • Sample

    240822-v9qfrszaqa

  • MD5

    5be407b01ad4de50559bfbf8dc3f7e98

  • SHA1

    25a24f3c27667ba56cf44f7ba92891db7bbfa346

  • SHA256

    11f2c66ee3a9d2a70ee4267d5db17444d6e825b29edba999acaf8a1dd2908948

  • SHA512

    66c855a50e0ea7935e600b01b292d0b3e43800a2e4f20bc83c0191ed4ed56df4f07c9970ef9d4f7c98835795cc5341ec3f42ac97877cc1a526e55bb459488949

  • SSDEEP

    24576:CqDEvCTbMWu7rQYlBQcBiT6rprG8aPimvY2Nnp5N:CTvC/MTQYxsWR7aPrYS

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7152694115:AAHaHmDCgcQp63bt60B-ZXF1o-UoY9ASQuE/sendMessage?chat_id=7368703476

Targets

    • Target

      Scan00048585.exe

    • Size

      1.1MB

    • MD5

      5be407b01ad4de50559bfbf8dc3f7e98

    • SHA1

      25a24f3c27667ba56cf44f7ba92891db7bbfa346

    • SHA256

      11f2c66ee3a9d2a70ee4267d5db17444d6e825b29edba999acaf8a1dd2908948

    • SHA512

      66c855a50e0ea7935e600b01b292d0b3e43800a2e4f20bc83c0191ed4ed56df4f07c9970ef9d4f7c98835795cc5341ec3f42ac97877cc1a526e55bb459488949

    • SSDEEP

      24576:CqDEvCTbMWu7rQYlBQcBiT6rprG8aPimvY2Nnp5N:CTvC/MTQYxsWR7aPrYS

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks