General

  • Target

    184242c7b4ac6db3091d2f2ac4cbfc80aa4306b9e2e5a2b4d258f315b6e5d4bc.exe

  • Size

    985KB

  • Sample

    240926-bjnppsybjl

  • MD5

    d79e5ae8cb5e88fefe9c626ca870c1c8

  • SHA1

    7381a5481f7047be4853c2cbad7fe8e51964b619

  • SHA256

    184242c7b4ac6db3091d2f2ac4cbfc80aa4306b9e2e5a2b4d258f315b6e5d4bc

  • SHA512

    9ac62818b33104b0d3d5b42e0625d44dc9c734dceccf05354c45a72685cbbca5d8e13961996ada0e0931ebc1c32ef1a7521e10b96ef57c6d09daf0abf84618be

  • SSDEEP

    24576:RRmJkcoQricOIQxiZY1ia7u+RhkGg9RU9:eJZoQrbTFZY1ia7ugg9RU9

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.invesxteu.info
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    rwe87$%21q
C2

https://api.telegram.org/bot5361912293:AAGLRU8lOnvgedEVLW84nw6uJBR8KKRq6f4/sendMessage?chat_id=5103867363

Targets

    • Target

      184242c7b4ac6db3091d2f2ac4cbfc80aa4306b9e2e5a2b4d258f315b6e5d4bc.exe

    • Size

      985KB

    • MD5

      d79e5ae8cb5e88fefe9c626ca870c1c8

    • SHA1

      7381a5481f7047be4853c2cbad7fe8e51964b619

    • SHA256

      184242c7b4ac6db3091d2f2ac4cbfc80aa4306b9e2e5a2b4d258f315b6e5d4bc

    • SHA512

      9ac62818b33104b0d3d5b42e0625d44dc9c734dceccf05354c45a72685cbbca5d8e13961996ada0e0931ebc1c32ef1a7521e10b96ef57c6d09daf0abf84618be

    • SSDEEP

      24576:RRmJkcoQricOIQxiZY1ia7u+RhkGg9RU9:eJZoQrbTFZY1ia7ugg9RU9

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks