General

  • Target

    fcb45401d06eddca3a0639caf5c5bbfa8171760c3324d2512303b0668fd6246a

  • Size

    661KB

  • Sample

    241107-xat11swpfs

  • MD5

    c7469f0bb006bf553aa12f88c8a987a6

  • SHA1

    8f829d02cad9f7ed7938f166027fb64f632ad46c

  • SHA256

    fcb45401d06eddca3a0639caf5c5bbfa8171760c3324d2512303b0668fd6246a

  • SHA512

    4108fee6ad68856997b1a5a1b668b7a2c70cadfc2e252d66df5cf01cdd383ed09ce725e53a4718c892d82903363057c74572de00d0bc72a02d7f35ff373e5996

  • SSDEEP

    12288:2c1h7c6OBXGthrL68TEjRZ/bNQB1nXRpfpMDRZE/kitnEhsxVDnMKJhWqk:2c1hlOBXGoZQBNXRhpuTskiaAAo2

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7733074716:AAHPqUDZNcrQPzH_G03x5ppIOnkxZuz-Nyk/sendMessage?chat_id=7337843299

Targets

    • Target

      dMiiWEXyxKh1KsZ.exe

    • Size

      711KB

    • MD5

      9cbc76422df47d71f92c5317656a8b1f

    • SHA1

      8d2dc4881467375e5728bde0039d63d320dfa80f

    • SHA256

      09f11da4c4722796e42555af0eaf04d325b7aa58961e8cf23bf081bb5cc6d4f0

    • SHA512

      f6970fda5eccb82ab9d0a447c70ecadf2a69e0dc81ba590d3d2388fe54451f3db91fb7622e7ef56c993030c7fee5764bf3748f743ee59303b48aac41c6b84de4

    • SSDEEP

      12288:U10e1F7Y7dXzut9rf68hdaptZecD/SiPbym2yEfXWXUGmkYe5/OMM8kS:U1F1FidXzuDaUcDSijX2tyX/OMZ

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks