General

  • Target

    11102024_0205_09102024_FACTURAS PROFORMA.rar

  • Size

    731KB

  • Sample

    241011-chs4gazcnd

  • MD5

    b4ab2d8e5fb974222276c5979d381714

  • SHA1

    c26b5951c621ac76790ef9cc680082d12f805635

  • SHA256

    fd65e8f874d975885318088bc7b522e8057754d544290db012fa7ca33662db89

  • SHA512

    15029e7a1e1e0316349abc89865b7cfda9e9bd5c7e7548fcc77599ec352565ca6e625a2dd73a59af279a2e65659cc54029c8ff9013ba9fe7f1541de3453eec64

  • SSDEEP

    12288:8UPVfPEAk0bBilG1do54ipVa2x+Wr19B9CCrFgju8UVIP8uBzj2zt6KbFO:fXk0FilGDo54iOY+Wpb9i2Ezj25tO

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7952998151:AAFh98iY7kaOlHAR0qftD3ZcqGbQm0TXbBY/sendMessage?chat_id=5692813672

Targets

    • Target

      FACTURAS PROFORMA.exe

    • Size

      1.1MB

    • MD5

      43723b5f3929b4f27f20a1bef23d7382

    • SHA1

      97b115fafd165021ef7f2c8476a79c9843200f49

    • SHA256

      19ced3f729d628d8b5b44c4f5c508349ece2cf5a730ea8ea893f931b5325b336

    • SHA512

      c68e6edb9902127c03d93c524a62785d4f05ddc91bbba111f47a1f973a262100eb85675a7c6b56b9478256c41e03f75d5f3c2f9c2d4d9b724cb4a4e4f2c141a5

    • SSDEEP

      24576:ffmMv6Ckr7Mny5QLUgmGiA48NoTgLTTXZ92uufOCRi:f3v+7/5QLU5GiA4fkzXZguuTRi

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks