General

  • Target

    e83231fa6c8d4df75581b44faa0180bc822f28168e12ed7590ba8c06a879a55e.exe

  • Size

    6KB

  • Sample

    241026-ddp2pawlfr

  • MD5

    e8988ad104148396f3bbc969c3e84a94

  • SHA1

    b2f862133633e4dd69debb0d12c926c7cfbfa29f

  • SHA256

    e83231fa6c8d4df75581b44faa0180bc822f28168e12ed7590ba8c06a879a55e

  • SHA512

    d736e729e6ea1b7d2a28bbb4da40b3b1202cfaed35ed0cfc883f249d8d61f9b89534fabb26ca27595c140bdb72131622aab4d5f3e12fed67eebc67a76282852e

  • SSDEEP

    96:ItlJkasxKUdSgvFKruk4Z50q1NjY2CMOt50vplejzNt:Fx5SgvFG4HtjY2omvLel

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7936689263:AAFVbTtCpguyJIaEvOdJBx9Oj9n157mQOMA/sendMessage?chat_id=6008123474

Targets

    • Target

      e83231fa6c8d4df75581b44faa0180bc822f28168e12ed7590ba8c06a879a55e.exe

    • Size

      6KB

    • MD5

      e8988ad104148396f3bbc969c3e84a94

    • SHA1

      b2f862133633e4dd69debb0d12c926c7cfbfa29f

    • SHA256

      e83231fa6c8d4df75581b44faa0180bc822f28168e12ed7590ba8c06a879a55e

    • SHA512

      d736e729e6ea1b7d2a28bbb4da40b3b1202cfaed35ed0cfc883f249d8d61f9b89534fabb26ca27595c140bdb72131622aab4d5f3e12fed67eebc67a76282852e

    • SSDEEP

      96:ItlJkasxKUdSgvFKruk4Z50q1NjY2CMOt50vplejzNt:Fx5SgvFG4HtjY2omvLel

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Drops startup file

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks