General

  • Target

    3970d7892dd746eb70adf454d1b0a7784c262674c0c1029f6967796f259c1c86

  • Size

    801KB

  • Sample

    241028-xnfesavfpj

  • MD5

    68d78098b5724899ce3f19970d9db46b

  • SHA1

    64518a0d5a97396ca882b73a0a7d0d4a793f8117

  • SHA256

    3970d7892dd746eb70adf454d1b0a7784c262674c0c1029f6967796f259c1c86

  • SHA512

    9df0591dd109e17e9032a5c34f0940ee23535dfdd9f0db8edca41ed3b307b51f5f496fa7a6c836502ce7b74ea524d45fe8d2e9e4e5b6858d378125c8d9feb39b

  • SSDEEP

    24576:2YtaRE1WAkkUNyyPUMO+FDrYc5MPksJkoK:2Yt9z0/UMO4/MPnw

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7498931539:AAE8KHb70FueL6YmOOF6rhS3Z3o-F1rx6_A/sendMessage?chat_id=1178171552

Targets

    • Target

      MB267382625AE.exe

    • Size

      1.1MB

    • MD5

      4518fb3fe25fb47b24f94fdeb7c0c3b4

    • SHA1

      ed6d787a0cb6e70abe2ffc4e07bdd78b2e8bb105

    • SHA256

      96fd6cc64869d71e0cee0acb92a0e6e986140836d2d189ef67d17d994c0a4b35

    • SHA512

      544e08f1867d20720035eae3100247a29752e356aa579a067cef28395a7bacc8dd768d545f79948e815c0a404a668f0232ef8d1f719b1063d762d83b993461c1

    • SSDEEP

      24576:ffmMv6Ckr7Mny5QLrQ4GyWnqJnkFsBx31yby14q:f3v+7/5QLXGfbFg16q

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks