General

  • Target

    e39c2886cca7aca486312e770a9cd3d01ca4e9824d43557cbebab1fb1a14e359.exe

  • Size

    955KB

  • Sample

    241114-dq81bsxmcl

  • MD5

    038e4e206bb1f4d698b3f5eeafc926c8

  • SHA1

    ad42b907f3d604f57550ce0441ab78e451848967

  • SHA256

    e39c2886cca7aca486312e770a9cd3d01ca4e9824d43557cbebab1fb1a14e359

  • SHA512

    800cf85683966750f757097900331963911ef077ba8f45660f5d743b14b12ab830481fc33581e75218d9eeb8cfa7a8a53f8eccb17371228ae0522522b178fed7

  • SSDEEP

    12288:itb20Qc3lT7af41ePBRYuQLKpqeUhbTv5OFgNuPPpHSga37g6tYqS6A:itb20pkaCqT5TBWgNQ7aLguS6A

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7591642187:AAF3F6-zxp3HwWsP9s4_QJW4W-aEGhjsvDI/sendMessage?chat_id=6557702940

Targets

    • Target

      e39c2886cca7aca486312e770a9cd3d01ca4e9824d43557cbebab1fb1a14e359.exe

    • Size

      955KB

    • MD5

      038e4e206bb1f4d698b3f5eeafc926c8

    • SHA1

      ad42b907f3d604f57550ce0441ab78e451848967

    • SHA256

      e39c2886cca7aca486312e770a9cd3d01ca4e9824d43557cbebab1fb1a14e359

    • SHA512

      800cf85683966750f757097900331963911ef077ba8f45660f5d743b14b12ab830481fc33581e75218d9eeb8cfa7a8a53f8eccb17371228ae0522522b178fed7

    • SSDEEP

      12288:itb20Qc3lT7af41ePBRYuQLKpqeUhbTv5OFgNuPPpHSga37g6tYqS6A:itb20pkaCqT5TBWgNQ7aLguS6A

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks