General

  • Target

    4d4c6fd4a56433abf2f9b0276733f99a25c932747d6883b678864839534fabba

  • Size

    490KB

  • Sample

    241112-jwteqa1nej

  • MD5

    65e1e3ab3faf6d20b98aea53286df953

  • SHA1

    86febefbc660884acc46cae89c0617d8263de6e4

  • SHA256

    4d4c6fd4a56433abf2f9b0276733f99a25c932747d6883b678864839534fabba

  • SHA512

    3cb7dc998696dd6f5aa695aa25aa24aa1b2c1240f57d43c9528b08ef51415314762923c1424908d178b4e6b6a4a1eeb0c1e589e6a8c785a645cbb741eaf270f2

  • SSDEEP

    12288:1KIKCtyJQTu09J1mKiiBo2n1zow/B+pqBcG6xVOKho2smfvqhPemlp:IIY2J1mXiu2nJowYqBcG+VOKmino/lp

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7985379579:AAFFNXAHJz6n24A6xEGgMMms826UxvjorNA/sendMessage?chat_id=6370711846

Targets

    • Target

      Curriculum Vitae Estrella Torres.exe

    • Size

      537KB

    • MD5

      0462f4a2fb67f34f430c9b99b6a4dcc7

    • SHA1

      bc571242e81f352620519e1d6b89f0765e91247a

    • SHA256

      3a174b6021bf10996282e9934d284a2f8a3fdf5e34ef90f18da13e991bd60524

    • SHA512

      1d2b50818cd4c8ffb960f0953674ee526dccbfad44b19ef1bb790672545689cd8213888b53d542b9b5c6cd11fa79a3eef6d1c12e969c865db8499a43be3e4922

    • SSDEEP

      12288:HnTDIK6tQJQ209JhmKiTAWj0In1z5/V+ZqBwoYx6KXO7BNdQTUMv6:HTDIg2JhmXcZInJ5AqBwok6KXUBNLMv

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks