General

  • Target

    ad711b0a8ab45a2b58d860086dee4ec3b6a13537861ee7e70aba8c59ea9d6d05

  • Size

    499KB

  • Sample

    241018-ca4j8szcje

  • MD5

    0298478914d02b2cb0a41c204e7cf45f

  • SHA1

    898a19b5288ed607b27aaa9d6b02a6c276577224

  • SHA256

    ad711b0a8ab45a2b58d860086dee4ec3b6a13537861ee7e70aba8c59ea9d6d05

  • SHA512

    c3c99fb0e7b205a8556203a72917f699b002aea14de61b016fe64896cc1caec27ec5ce5b591071b931addf17fa00da2c3a7f348be376a06ece7d6c24429e02a5

  • SSDEEP

    12288:GNUSJediRu1XZNrNpykUW2Lq8/BMDW+WlOqpVs2TGYzcc9e:GtQku1TzDoOqpVZTGYzc8

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7719054034:AAHonYJDOpWskt5QdgdvYe662dLuhtscDqw/sendMessage?chat_id=6370711846

Targets

    • Target

      ad711b0a8ab45a2b58d860086dee4ec3b6a13537861ee7e70aba8c59ea9d6d05

    • Size

      499KB

    • MD5

      0298478914d02b2cb0a41c204e7cf45f

    • SHA1

      898a19b5288ed607b27aaa9d6b02a6c276577224

    • SHA256

      ad711b0a8ab45a2b58d860086dee4ec3b6a13537861ee7e70aba8c59ea9d6d05

    • SHA512

      c3c99fb0e7b205a8556203a72917f699b002aea14de61b016fe64896cc1caec27ec5ce5b591071b931addf17fa00da2c3a7f348be376a06ece7d6c24429e02a5

    • SSDEEP

      12288:GNUSJediRu1XZNrNpykUW2Lq8/BMDW+WlOqpVs2TGYzcc9e:GtQku1TzDoOqpVZTGYzc8

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks