General

  • Target

    26102024_0054_25102024_Curriculum Vitae.zip

  • Size

    594KB

  • Sample

    241026-a9cjpavjep

  • MD5

    360147fced49db2a8f21bb0b1ea76a82

  • SHA1

    3da193308b1292871f396d62aeebea3aa56d52d8

  • SHA256

    b4959d3ecdb2bcc546b4d00f0902a1dc1e6b81c1627db1e5867c805aea65f495

  • SHA512

    9272aee1423e9825ea91f1f7b7f29f26030c99e5dd9819e8aae82b687b368d354c467bbed41a1df2388b15f761ae0937bef474b32bfc0018fe7fda61e0605ff8

  • SSDEEP

    12288:JN1BMg1Fhhqo/KsfSiAeRdY432buNN8HUGeWQAN0gPYhoFjA:JN1SYF1NfGeRV2buN98whOjA

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7719054034:AAHonYJDOpWskt5QdgdvYe662dLuhtscDqw/sendMessage?chat_id=6370711846

Targets

    • Target

      Curriculum Vitae.exe

    • Size

      663KB

    • MD5

      6c0dfef9d3fd776a33284c57e72e210f

    • SHA1

      f39d49085f8099bde2f617e838cf3f93a55d798d

    • SHA256

      8b0cf5a006d406708e02f6a031e9f633ca10d4d5937b177ac560a816c09d69be

    • SHA512

      029540a1a0ee4ea3cc0a710f16dd8267556371f1e1963a6001a8f55af7dc06f731ed33b42ec5cbed4e6139dce6ef3b92a840c7a6488a5d3f82b08b5b3fd2b758

    • SSDEEP

      12288:Sv1gekF95mo/isf+iakRdWMR2bu5NcH2G2WuADwWP2hoT6H:cmvF1FfokRX2bu59KOhM6H

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks