General

  • Target

    FACTURAS DE PAGOS.exe

  • Size

    1.1MB

  • Sample

    241001-xbq1ravcll

  • MD5

    9c8abce530cbbd790310a29b3e43acae

  • SHA1

    51993d18cf25c9d336c64655ef18849ea3ff27c0

  • SHA256

    b1fd45ab9653b2ccab7e6c9867acd8e880f80b4e55425347321d39927cd726a6

  • SHA512

    e14addd848815b7b40bf17fa9ecb155e0b745aa6a0ffabea913d9444763511827dcabf32962fb6e8b7ec61f395b7398af6f36fdf53b4fdc4bb068659269b05d8

  • SSDEEP

    24576:ffmMv6Ckr7Mny5QLTUoUJ9E0jFcmPLuZ+l7XATt6W:f3v+7/5QLDUzE+JuIlMUW

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7952998151:AAFh98iY7kaOlHAR0qftD3ZcqGbQm0TXbBY/sendMessage?chat_id=5692813672

Targets

    • Target

      FACTURAS DE PAGOS.exe

    • Size

      1.1MB

    • MD5

      9c8abce530cbbd790310a29b3e43acae

    • SHA1

      51993d18cf25c9d336c64655ef18849ea3ff27c0

    • SHA256

      b1fd45ab9653b2ccab7e6c9867acd8e880f80b4e55425347321d39927cd726a6

    • SHA512

      e14addd848815b7b40bf17fa9ecb155e0b745aa6a0ffabea913d9444763511827dcabf32962fb6e8b7ec61f395b7398af6f36fdf53b4fdc4bb068659269b05d8

    • SSDEEP

      24576:ffmMv6Ckr7Mny5QLTUoUJ9E0jFcmPLuZ+l7XATt6W:f3v+7/5QLDUzE+JuIlMUW

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks