General

  • Target

    NEW ORDER 4016291 240043.ace

  • Size

    527KB

  • Sample

    241023-jsvhls1bpm

  • MD5

    5eb0b3923138b463207070d773a93693

  • SHA1

    cd1a9ca12289acf171a8cf4918ffd1bb67d76223

  • SHA256

    cdf24f64ae6cdb81c320151a17631ce36525204ce75e4cbe70efd2e84578bc35

  • SHA512

    0139f62bb63f1b03aa2a863068daca6dc4c53d54c364b896caa89caf3f7c9b1119db7f2aab3d58735fa8de92cfae5411d38a14c55e448f595087844aefa96023

  • SSDEEP

    12288:GUWM5kpKHGXPAvmgMfuP7761RTI3BvefjhpJhM68T7b6o1ysM+k9156:GE5gKIAegMfuPi1RjvMVT7WoUsM+kDQ

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot8142299351:AAFDTrtIpOoWWO5SiyZfI7QSQ2VJ59N65c8/sendMessage?chat_id=595808702

Targets

    • Target

      NEW ORDER 4016291 240043.exe

    • Size

      644KB

    • MD5

      f732e3f360a08319d434ddab7d14c54b

    • SHA1

      e085c99c0b2ceb1b67666673401d0c5a80cc1688

    • SHA256

      c66ae68bb8b705111729acd9afdd0285355bd8fa87e963af02a63ab79476a639

    • SHA512

      3b48b5bcaf43fdb258e70345be282042681a895562d6c3cc7dc08df667aacbba5b3f3bcc44c496f14b22be56d24083d63d6282a453d63935d619472266e465ba

    • SSDEEP

      12288:NoTtqGBa15pfdobPeJtcKxqaXgY3kXT7EdNGyMh:NoTPQlabGrcK59oodNGF

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks