General

  • Target

    invoice.scr

  • Size

    39KB

  • Sample

    240925-cvl6pasdrc

  • MD5

    7a1eaa7fa6331234f98c277dbe7f1d73

  • SHA1

    aaf18053d0e33d3828483055ba005efe8d158e0b

  • SHA256

    2b08eaf684fa5bff0d475dc65cfd05e76f08d2d87640bc9a649fcca140c88ec9

  • SHA512

    8ef567d762196bce185e4720eedcea8eccc42e0df8e37a78d0d39cdeff98ee243770db75e0a9cfaecaea9c72ab65da37628eae110b55364a6c9c9d981c525268

  • SSDEEP

    768:YThNpQ8uJrQAEPb1kse1SnUEXoz9uW41Ep8gEVJYNWKjsj1We5:Y/qxJMRMuWCXRSNdjSWe5

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5945022662:AAH3tNDq2H4t2_2yAxq__TOQa3RMNliwRjM/sendMessage?chat_id=6147569474

Targets

    • Target

      invoice.scr

    • Size

      39KB

    • MD5

      7a1eaa7fa6331234f98c277dbe7f1d73

    • SHA1

      aaf18053d0e33d3828483055ba005efe8d158e0b

    • SHA256

      2b08eaf684fa5bff0d475dc65cfd05e76f08d2d87640bc9a649fcca140c88ec9

    • SHA512

      8ef567d762196bce185e4720eedcea8eccc42e0df8e37a78d0d39cdeff98ee243770db75e0a9cfaecaea9c72ab65da37628eae110b55364a6c9c9d981c525268

    • SSDEEP

      768:YThNpQ8uJrQAEPb1kse1SnUEXoz9uW41Ep8gEVJYNWKjsj1We5:Y/qxJMRMuWCXRSNdjSWe5

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks