General

  • Target

    0de41e3a816a005f0b35df372d0618253964b5be6945408d403e9b1292fb200f

  • Size

    1.1MB

  • Sample

    241113-wybc5sxckl

  • MD5

    9a3633d66c81d5a2929a9314bc15e04a

  • SHA1

    9ac79d99e83bdfe71d876292fb48979d9f6572af

  • SHA256

    0de41e3a816a005f0b35df372d0618253964b5be6945408d403e9b1292fb200f

  • SHA512

    98d9af9350d4083a3593c0c98cacc315ba0274b4badd0ec9e4294046e5c350806f69be7a7cf0fe0fb2172e4f3b012a2bd324c15c9b9e38ad328195e269fe179e

  • SSDEEP

    24576:ffmMv6Ckr7Mny5QLL26iXWFsDsXbjVmUmG2/OE:f3v+7/5QLL2iaIrJma2/V

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot8069991368:AAEDxeDrVuH4v6iEp_2FvvnhUUBR7gnXopg/sendMessage?chat_id=6048393012

Targets

    • Target

      0de41e3a816a005f0b35df372d0618253964b5be6945408d403e9b1292fb200f

    • Size

      1.1MB

    • MD5

      9a3633d66c81d5a2929a9314bc15e04a

    • SHA1

      9ac79d99e83bdfe71d876292fb48979d9f6572af

    • SHA256

      0de41e3a816a005f0b35df372d0618253964b5be6945408d403e9b1292fb200f

    • SHA512

      98d9af9350d4083a3593c0c98cacc315ba0274b4badd0ec9e4294046e5c350806f69be7a7cf0fe0fb2172e4f3b012a2bd324c15c9b9e38ad328195e269fe179e

    • SSDEEP

      24576:ffmMv6Ckr7Mny5QLL26iXWFsDsXbjVmUmG2/OE:f3v+7/5QLL2iaIrJma2/V

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks