General

  • Target

    6baa5b3c8d1fb27f023a7c750b057725dee45180f9ebb300b7899a4a0488d2b0

  • Size

    313KB

  • Sample

    240925-rbp6kayglq

  • MD5

    3145bdaea4eaff5d87c5aedf53ad984c

  • SHA1

    fc47a1be359b633cc21eb6b29783618acb402c51

  • SHA256

    6baa5b3c8d1fb27f023a7c750b057725dee45180f9ebb300b7899a4a0488d2b0

  • SHA512

    a0e549ae45a49cc3b74edd8a4095f8166c632ad607a1e136a9c25a43ba377bedd9cdc5d6400198ea1b6894ff8dc85d12b9d3d040f14e59d986f84eae07c1bcb6

  • SSDEEP

    6144:TaBSx6s0p/7v9oZrbD5J+PqmctK51/ENX4wY7xmCGzmnsmzHh7hDl2:TathRq9J+P5cs//ESdtm/qs6HFRE

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7984047337:AAGSaG0nExqxkiCbwnZqDwxijOF59XBFFIM/sendMessage?chat_id=2135869667

Targets

    • Target

      cargo details.exe

    • Size

      519KB

    • MD5

      ce69dc28f560bf9b3c582c95209a6e54

    • SHA1

      382ff38ef572983eb65f86b3bd590a4a1423e309

    • SHA256

      212b67aa7c112af1b53d5d892e787b07b2edbfeecb22fb4d60781ba8f1820b82

    • SHA512

      9664b5b5c6a0d493a7909ce5baf00fd51440bd703567022199161a9fd1e5e8ecce6fa5af46f78633acf6fc1f93d8cfc5a62039372995af3e637523931410d2e9

    • SSDEEP

      6144:T6ejWxd7pU7vroaXwxT5LSvObOPVaIrQJt/M7RMcwrENXjeUR1n099bw/c3TYy9k:T6skNHbOPeZrEVnhcd38yTVjs

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks