General

  • Target

    CV Paula Galarza..ace

  • Size

    601KB

  • Sample

    241022-q8ntbsybmg

  • MD5

    e2f0ad968655f5325e1b6717001360d4

  • SHA1

    35e9c5c1226a39cae6d77dd5f95db369b026c561

  • SHA256

    05a910be5ce56cf94d2901938d26df92e209cad9defa333d39c082f698fba019

  • SHA512

    cd1ea5af1442c1b8521fc3bcf0327cf630442e767099ddacb51b2e4c028e63308ceefc7b0d7f1da0e27b7a7f1e2b197ba80cef278f76e22e7309e49446627d6e

  • SSDEEP

    12288:VQ7CQn377KHot7RS9Efhtc4JA19jkmaHUjUlC3hM+Hh2z+6IQNy3aysg:VaCG377RRB/JQUHUjU7+B2z1ItKysg

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7925383692:AAHB0cxNGwsFVZxBJrUTW-AZ__B_KxqE6hk/sendMessage?chat_id=2146433139

Targets

    • Target

      CV Paula Galarza..exe

    • Size

      787KB

    • MD5

      8a80513ce862e3f47158dfa82e208965

    • SHA1

      9c68e9526062abd665666f10e0520850bf19727e

    • SHA256

      8aa17384f8bbf04f91228b1e1a58f22fb086bd91d5f1803d69c710607a2e511e

    • SHA512

      5e90bb9a1df25d6c202b720c9325bc122095570287876612843fd8347fbc418444240880fe9cb7d36a10500f16e7e3e2fe0dcf429b9c664a9ba2fb63b6df0374

    • SSDEEP

      12288:9eYTBDtQFWKDvedwIiyNGm3ds26oECTBEHwg5b3Pz0CapC:nWFbvedJrNBmAfTOh5b3Pc

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks