General

  • Target

    3e2f27edd3deacd8f08f6ed1133b2040.exe

  • Size

    948KB

  • Sample

    241015-j3vw5axgmr

  • MD5

    3e2f27edd3deacd8f08f6ed1133b2040

  • SHA1

    060e3218949c5a006bb8607e8228e6539b737bfb

  • SHA256

    163a25e2b68ed09eb4cf82f28c87568969091764bdfb4140b4675a00e2d2ed86

  • SHA512

    da437c39e3337f6750c3b9353c71999c16415ec1fecdaa4bba676bb12207cb51a7258b91b175d1893ae4e9111fa9ccf027151ad7527d9d78df59f86436cfdb42

  • SSDEEP

    12288:rLkcoxg7v3qnC11ErwIhh0F4qwUgUny5QLhXfyaU9nV6iwCqg3ICHxX6i6fUTRZL:ffmMv6Ckr7Mny5QLtqa8V6iwCqgbHEoL

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7913958792:AAFOhfKo5L7M50XG6odxxQQwJAeD3zGEuJU/sendMessage?chat_id=7004340450

Targets

    • Target

      3e2f27edd3deacd8f08f6ed1133b2040.exe

    • Size

      948KB

    • MD5

      3e2f27edd3deacd8f08f6ed1133b2040

    • SHA1

      060e3218949c5a006bb8607e8228e6539b737bfb

    • SHA256

      163a25e2b68ed09eb4cf82f28c87568969091764bdfb4140b4675a00e2d2ed86

    • SHA512

      da437c39e3337f6750c3b9353c71999c16415ec1fecdaa4bba676bb12207cb51a7258b91b175d1893ae4e9111fa9ccf027151ad7527d9d78df59f86436cfdb42

    • SSDEEP

      12288:rLkcoxg7v3qnC11ErwIhh0F4qwUgUny5QLhXfyaU9nV6iwCqg3ICHxX6i6fUTRZL:ffmMv6Ckr7Mny5QLtqa8V6iwCqgbHEoL

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks