General

  • Target

    e2eb6ae5ae0c59c2c20cded55d33293fc3a88431312ace0a943ae074991ff1d5

  • Size

    1.4MB

  • Sample

    241004-khs3gaycpe

  • MD5

    6d5807bd598382564ee08e4e6f3d158a

  • SHA1

    8830b8fa46873a4fab26e490e98b3df54c78d7a7

  • SHA256

    e2eb6ae5ae0c59c2c20cded55d33293fc3a88431312ace0a943ae074991ff1d5

  • SHA512

    81cecd449474982284744350ed87c44b6e5a4ceec697cb191db032251a1eebddf2ff83b1e528076b3eae26970e33569ca6c08af4ceac754407010d74a06a04e2

  • SSDEEP

    24576:mIi2NctPvgQ5Zt52JcWkiKL9ZaP2cTxN6diDi5fR458rIRtjrUDL14+WLy94a:mPKctPYVtXqZ1cT76d/9e58rI3oDLW+z

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7763642353:AAFJAT5gGdyzAPlr52ZFpaxd8BnWyDl4dX8/sendMessage?chat_id=6012493587

Targets

    • Target

      PROFORMA FATURA pdf.exe

    • Size

      2.3MB

    • MD5

      a30e9b58b16c609e63db086c39fc5c83

    • SHA1

      c4d0933d90088ba673e17bcff3efd52dace7e8df

    • SHA256

      f278e9e47422ea40eda7002194f17872643ab88366e84124813f161b28be9c09

    • SHA512

      2a1bdda4e3c2ad2ad312acd87d16f4ccf9dc6ce3b50941d1771ef53786da9f91c71629096c3403b7b48cdb9ad215facf958a1353c5f0380b846987c9da90ea7b

    • SSDEEP

      49152:tDCNmXVrxzzilHH+/EZvwN/Idbze5QYpiDLT+s:qHH+cZvPd/ew

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks