General

  • Target

    b6598e4bebdaa8372c87734d10bcbf7e5a3258f7a40fd929be48ed694b068c44

  • Size

    971KB

  • Sample

    241105-dghf1ssmfy

  • MD5

    ec7ed0b44276b1c9a3cb845669b08aa6

  • SHA1

    55a3a180f97f71484b36a8260488d31285431dee

  • SHA256

    b6598e4bebdaa8372c87734d10bcbf7e5a3258f7a40fd929be48ed694b068c44

  • SHA512

    bb96d3d7459b966bc3517383ec142ec04c96417cd1a47e03a14f2b06f0928b9f605b96045b9f9fe69015c382daf9831c636a1ec11e814b67602e1730eccd530a

  • SSDEEP

    24576:mAHnh+eWsN3skA4RV1Hom2KXMmHaVXNW9qV8kwlt44eh5:Bh+ZkldoPK8YaV9WDS

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7152694115:AAHaHmDCgcQp63bt60B-ZXF1o-UoY9ASQuE/sendMessage?chat_id=7368703476

Targets

    • Target

      b6598e4bebdaa8372c87734d10bcbf7e5a3258f7a40fd929be48ed694b068c44

    • Size

      971KB

    • MD5

      ec7ed0b44276b1c9a3cb845669b08aa6

    • SHA1

      55a3a180f97f71484b36a8260488d31285431dee

    • SHA256

      b6598e4bebdaa8372c87734d10bcbf7e5a3258f7a40fd929be48ed694b068c44

    • SHA512

      bb96d3d7459b966bc3517383ec142ec04c96417cd1a47e03a14f2b06f0928b9f605b96045b9f9fe69015c382daf9831c636a1ec11e814b67602e1730eccd530a

    • SSDEEP

      24576:mAHnh+eWsN3skA4RV1Hom2KXMmHaVXNW9qV8kwlt44eh5:Bh+ZkldoPK8YaV9WDS

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks