General

  • Target

    ac8eb55946044c480bbf293ca062a56329f389f14978856912932bfcf6321104

  • Size

    906KB

  • Sample

    241111-dabpws1cpp

  • MD5

    1129d1e5393f199136aa2e16f6e560dc

  • SHA1

    73255a76016c84fe667942d2551442840ea78f01

  • SHA256

    ac8eb55946044c480bbf293ca062a56329f389f14978856912932bfcf6321104

  • SHA512

    7be8402252fa70a717cca3ad2da2143a3c3af683b82e7d5d58e3eb04aaecbc9c484a83abdc227a098678d1b49304f56793e22509baa6394c5bcdbc0a0e2fd6b5

  • SSDEEP

    24576:2rzMOmLLScrYNxj8u3WR3Wg/Q3RPS+3C8zfL4lvB:M6fSLGR37MPS+FzzY

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7814594885:AAHa3uCXluFI0wdWKPRtBnbO9yWlWuXuj84/sendMessage?chat_id=1178171552

Targets

    • Target

      MB263350411AE.exe

    • Size

      1.4MB

    • MD5

      608294e129ad08c8a09b69b9597bf382

    • SHA1

      d45e09a25a8f199046745a9fcdf37ce5b2213480

    • SHA256

      6ce381a9173d54b9556e152b98b931d8dbbd9adaa6b2ccc8d5b50320d7ce2b70

    • SHA512

      8ff9c82933fc7f3120c8941162ddbd4fbbd66b67975dd6831dcc678dc02abb6162833d10dc9a44458af7bd3f842ea68b1239eddec201f3144eb38a5861f1abe0

    • SSDEEP

      24576:c5EmXFtKaL4/oFe5T9yyXYfP1ijXdaJkpv4vNaX167/Hrget0bMfukHhMT:cPVt/LZeJbInQRaJkGvQF67vUckkuq

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks