General

  • Target

    Solicitud de cotizacion Stro1268975.zip

  • Size

    493KB

  • Sample

    241113-tbc74sverq

  • MD5

    b714adf835e0e5514bbb17603741c12d

  • SHA1

    330cac4a0d305a74cae9810a64cf7974a8b2349c

  • SHA256

    4ff1c3892a4c9c170b9f464f1bcd244b2cf6d68e60d561eda9a259e45bd2da90

  • SHA512

    820b208fd3bdfd0ae874982a77eb7e4f0f832460bf765638e120bfa2a0dcbd15a5a2b4f2d4c21a074063103be6fa18179d49255bc0b212d6bb476ca32cd64d82

  • SSDEEP

    12288:GeZdsUHm08MZ6UzzjuvlwHB8am30Zxzbf8oBu6ytwq:7q6vZ6Uzzj0wyas0b7D06yz

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7985379579:AAFFNXAHJz6n24A6xEGgMMms826UxvjorNA/sendMessage?chat_id=6370711846

Targets

    • Target

      Solicitud de cotizacion Stro1268975.exe

    • Size

      546KB

    • MD5

      0f84f8f18907b23ecde50b2b7025f5fb

    • SHA1

      5a1286f0e3cd47e365e250fce43f0cc3bd53a818

    • SHA256

      4d9269d0c5706adc5a898408e788b15e5cdf9e490ccdec4c52aec64b8f8c63a2

    • SHA512

      4ee294079372694ec9e9eda80ef23b5384bfc172f6d55dcd55407704b82420cb728973de3d4e4306fbeaaa31446e9d10f6bf0f218787b9959fc44026d334ccc9

    • SSDEEP

      12288:WMyCaKNF6Z6YtzjuKNoWTwHBgaSf0XThDVwoBkHZzD:WMytxZ6Ytzj9mWTwKaI0NhnKP

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks