General

  • Target

    c4a852d85ff37c57045cd79d2e21d3ea1325fed90116ecb513997b945fac9b42

  • Size

    482KB

  • Sample

    240912-1q1ehswhjl

  • MD5

    072c5c9749c79c52f3ab6a37714b0e03

  • SHA1

    f9dbd3c98314661c24d83b15363618395121c350

  • SHA256

    c4a852d85ff37c57045cd79d2e21d3ea1325fed90116ecb513997b945fac9b42

  • SHA512

    48c59fe1d5bc63fcee7f462cf5697cb8d97618896afec50051bbf3acc4b3c5e524896dd5fc47d4825313a54634d6bdbccd3d09238fe6e8eb6a52c055ce89aed0

  • SSDEEP

    6144:mQgxqaghBeICoKWK5knPg6S6vO8PtJerB0s4VHr4DDZJCLaROplLaKLWsQLkr0:mBwayjVKWxOotJerBC4DbyJlLa6bLY

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6820629737:AAGJ8tOkoD9jFHkd_L1kG1ntQ1J6zLhFsMc/sendMessage?chat_id=6783205225

Targets

    • Target

      Purchase Order.exe

    • Size

      1.7MB

    • MD5

      1967f948fc281d1217739c9aa5b05d6b

    • SHA1

      c2b30a0a3be5b4671218ec22ba4d58f155a054ca

    • SHA256

      452f83faadab38d84bf3593ed94a45779e32dcf6008ee382c41f47531330e7d5

    • SHA512

      2991226e8fe34ae1e60426c56d7f0bd91b1f25e7650bd54930484e512d1827ef1e24a9691c3a8e9eca4fc8f719ca4f6b98c9e75f96bb7a9fc082079b4e9accdd

    • SSDEEP

      12288:7mOvpE6rn3e3GtugblwJADA4U0JrhdPjaWDy75EYzqR1:KOvGIOW/blwa0E5hZjaWDsqT

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks