General

  • Target

    5950103f0c1085852ec034428df971dd6cadf7e1812008e5ca775463af6213ee

  • Size

    634KB

  • Sample

    241118-hygm9s1fma

  • MD5

    2029b052e7738a5e9ab7c4cf7dbc37ee

  • SHA1

    b145f5095334c7fb88b1af6421f01bb324deb91a

  • SHA256

    5950103f0c1085852ec034428df971dd6cadf7e1812008e5ca775463af6213ee

  • SHA512

    c8f917c8be8010a5839c1669b04c4bb4c10fa07a1e890d29e87049d0936ef958709551a7e243c59ecd91a8346bac8827ad783dc081a2fbf93694681e7e95a246

  • SSDEEP

    12288:oW+qVyNvTVjMwukqSIvEa1hSLj51Ly027bzrg8Tz797uQMf5HnJhme18SPjY0Qi:8zNTukqSIckh09cH797eZJhmlSjWi

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7399492470:AAF1Q52TLq6uEICFiCVrLu9dpROnjh2wukI/sendMessage?chat_id=1443320838

Targets

    • Target

      SOA Oct 24.exe

    • Size

      1.1MB

    • MD5

      10169da08bb0f39076b33dfbd5ff8bcd

    • SHA1

      7867e87076e8cb3f160ad91c28d48a15ce573174

    • SHA256

      da468beb20714dfb771a050b460cf9a00e2123a6a05c19f67a20242cb5d37b0d

    • SHA512

      1ce4f6cf44dbe682f443795d9e8f46bf22b2e6482fbe01cd1d6bc8547c9e157cd7185ca868d7c01fc0531ccec915ab994f381e6b045abdadfd78e023b953b0eb

    • SSDEEP

      24576:ztb20pkaCqT5TBWgNQ7a2Eu9icOzK3+3kkz6A:wVg5tQ7a2EnT+O0+5

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks