General

  • Target

    Tpnit.exe

  • Size

    959KB

  • Sample

    240913-n7116a1ara

  • MD5

    5b0a60ef51c05675082381b585d61bb8

  • SHA1

    a366c2ca83a519d0cff24f7b3ff6cdaa2412f673

  • SHA256

    f5b1deb060982e05d98c940ebf0b8d50cef95922fab5fed5ed8c2a9d7acdda80

  • SHA512

    7b67910f4b108aafb0c2e3a31128d052d836d4a4be648b7a0603e04800e00a0b709d449835ac0031958eacfa15555844590c49e1e5430aab0316477f01a6480b

  • SSDEEP

    24576:4wSCS8u8YPnQ/BpIZ5tkZLRmCfOKu/FAyyaP7y9xlfhqpGcbuueq:RzS38YPn6FZcFe0m9hqocburq

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7327372938:AAHFwuC3knQ9jY-1T98yh8owXZiixS_neU0/sendMessage?chat_id=6951521546

Targets

    • Target

      Tpnit.exe

    • Size

      959KB

    • MD5

      5b0a60ef51c05675082381b585d61bb8

    • SHA1

      a366c2ca83a519d0cff24f7b3ff6cdaa2412f673

    • SHA256

      f5b1deb060982e05d98c940ebf0b8d50cef95922fab5fed5ed8c2a9d7acdda80

    • SHA512

      7b67910f4b108aafb0c2e3a31128d052d836d4a4be648b7a0603e04800e00a0b709d449835ac0031958eacfa15555844590c49e1e5430aab0316477f01a6480b

    • SSDEEP

      24576:4wSCS8u8YPnQ/BpIZ5tkZLRmCfOKu/FAyyaP7y9xlfhqpGcbuueq:RzS38YPn6FZcFe0m9hqocburq

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks