General

  • Target

    55e4887d083e3db2ad9079519356a1a0f553317f2c8d9218939cb0020426b68a

  • Size

    541KB

  • Sample

    241106-l7szfaxmgv

  • MD5

    4588a72d5e6d5e0de97a54ee3890f444

  • SHA1

    096b5ec1fd61cffbdc354b251c06f9740333cf55

  • SHA256

    55e4887d083e3db2ad9079519356a1a0f553317f2c8d9218939cb0020426b68a

  • SHA512

    2d5e796f06d16b49a18654987f29a3849eeae65b9c4c2f832dfb7eef07e9e27ba85eddced171763799495d11cad1011bcc1c32e82e6de01403f89468faafe552

  • SSDEEP

    12288:Lfy73+WX/iYwRFYIwWYdb1Kv2qn2wgROWU4UQ/ftl398CIFZ:Lfcb/6dwWKb1Kv2llBU2eCOZ

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7719054034:AAHonYJDOpWskt5QdgdvYe662dLuhtscDqw/sendMessage?chat_id=6370711846

Targets

    • Target

      Curriculum Vitae Estrella Torres.exe

    • Size

      571KB

    • MD5

      7030700ead128aab5df0db1675020937

    • SHA1

      130d55bd32b2642fb27890a62e8eabd9b3b60611

    • SHA256

      31af8e06fb179797320d0d79fce8a7c603e6156bb0b0642a41fe818b4894eb8f

    • SHA512

      24718210a0562379e597ebef1b18731918d8e4907f29bc711f203282e1b674ce602bad6e872098eac23b801b44bd5d838c3b57f4b2951d0754a9ad550a7c6a2f

    • SSDEEP

      12288:AcPZbEeX/sYw0q59eiXjS1SvAqnYwgJOAI4UUDJLqi6r59l:AcPh//m9ewe1SvArlPIkDzm5

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks