General

  • Target

    Offer_2024110501.pdf__________________________________________________________________________________________________________________________________________________________.7z

  • Size

    388KB

  • Sample

    241111-snbdlstpbk

  • MD5

    0766cfc664424321a985255dfa3121dc

  • SHA1

    1e5201201a9fc5afed0f0003eef5da396dd5f445

  • SHA256

    94ef4a541babff8bc8596c7da5b937b6a7a9564fc4a631701f9e5befc33fd963

  • SHA512

    2492e081e77b81a2540427cb4fb7d564bd984a57174fca5f4154a548754d9d841ed37060b624e7040e00823fdb73c89b8b48e02a841ba3382debef36d8a983c7

  • SSDEEP

    12288:pFkGQ/trs32zyPrjzernASto1IJ04gJE1SnkvNL:pmljzyPrjSHy1IeJ8WQx

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7956086012:AAEHTqhkPb2OzB5GbcO5JoISGRqcFuMwdn4/sendMessage?chat_id=5302361040

Targets

    • Target

      進口2024110501.pdf__________________________________________________________________________________________________________________________________________________________.exe

    • Size

      1.2MB

    • MD5

      f585295744e49112f89a5a780645c416

    • SHA1

      0e37e6047af775bdcc95e173980a7972595c4094

    • SHA256

      8777c299f9a823f9c959d4bf77d8e61c3e3a0967a6b8c83a10e9087998b15ffc

    • SHA512

      2993628d7950f2de5c043234ed85850685ea392c169faceebd6071bcd210e6996d58bc670bcb99de872f45c9b9f18c07737089342e7af1222d8e5ca09c72e6bd

    • SSDEEP

      12288:jQdHxoWrmhiH7niDtx+qwqzZTg9IJbpQFSk3v5OsRr4NI8Lyym5g9dorD6m8rrvl:jgSm7A1mI5pQFn3RrXAXKD63rv

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Drops startup file

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks