General

  • Target

    d1b74631302b5c504591567f870ce97e2b449e9172da6bf07a24d12923b9366c

  • Size

    737KB

  • Sample

    241115-w4j78ssram

  • MD5

    fd1d7ef6ea22a9adc1bbcda9dded5594

  • SHA1

    44c8c1c01b4eddfc8d997b8876d1d5d237d7578f

  • SHA256

    d1b74631302b5c504591567f870ce97e2b449e9172da6bf07a24d12923b9366c

  • SHA512

    6dbb40a25239c91e8e303da93876d22d0a8323d2b53de8f0ddd121f88e097c8c3e71d91981315a4db11fca2f0b172a277ee926cb7e78794f59c11f8e3a539679

  • SSDEEP

    12288:rjKoRYU1YjyndWCbikvj7lEemhtcZa/TRNxjsa1WYEaIdH4:nKoWUr31xEemh6Za/NjBYtd4

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7719054034:AAHonYJDOpWskt5QdgdvYe662dLuhtscDqw/sendMessage?chat_id=6370711846

Targets

    • Target

      d1b74631302b5c504591567f870ce97e2b449e9172da6bf07a24d12923b9366c

    • Size

      737KB

    • MD5

      fd1d7ef6ea22a9adc1bbcda9dded5594

    • SHA1

      44c8c1c01b4eddfc8d997b8876d1d5d237d7578f

    • SHA256

      d1b74631302b5c504591567f870ce97e2b449e9172da6bf07a24d12923b9366c

    • SHA512

      6dbb40a25239c91e8e303da93876d22d0a8323d2b53de8f0ddd121f88e097c8c3e71d91981315a4db11fca2f0b172a277ee926cb7e78794f59c11f8e3a539679

    • SSDEEP

      12288:rjKoRYU1YjyndWCbikvj7lEemhtcZa/TRNxjsa1WYEaIdH4:nKoWUr31xEemh6Za/NjBYtd4

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks