General

  • Target

    ddfc226180d19aa860f81b888702f0b37e1f59478c4c0baaf7ec97d85da380c6.exe

  • Size

    634KB

  • Sample

    241120-3zycmawclc

  • MD5

    1e3a75a6d284c8e0f63ea91b1aae69a2

  • SHA1

    e12e0f7a3bef74c9da3ba2e92fdbde73b97f403c

  • SHA256

    ddfc226180d19aa860f81b888702f0b37e1f59478c4c0baaf7ec97d85da380c6

  • SHA512

    6f0ab96b0b0e2a016b6e8c56db308cc748f6b86784a5fb443b26d13b5b6c7232a4934106acfc73cc55f8b03e124042d9fe99da2e4920b08f2b98030da6b59209

  • SSDEEP

    6144:pGxhLzIXav5wzU3oHY59KCvkg9yDUo1BfcnCMk+DI3D8+4Z2wwwxItGrKsPE7Gl:YMeis5X8gchB8CQGA+8OtGrh

Malware Config

Extracted

Family

snakekeylogger

Credentials
C2

https://api.telegram.org/bot1620445910:AAF2v81NoINJsu_XXnpGet1YDm-NxnznaIE/sendMessage?chat_id=1063661839

Targets

    • Target

      ddfc226180d19aa860f81b888702f0b37e1f59478c4c0baaf7ec97d85da380c6.exe

    • Size

      634KB

    • MD5

      1e3a75a6d284c8e0f63ea91b1aae69a2

    • SHA1

      e12e0f7a3bef74c9da3ba2e92fdbde73b97f403c

    • SHA256

      ddfc226180d19aa860f81b888702f0b37e1f59478c4c0baaf7ec97d85da380c6

    • SHA512

      6f0ab96b0b0e2a016b6e8c56db308cc748f6b86784a5fb443b26d13b5b6c7232a4934106acfc73cc55f8b03e124042d9fe99da2e4920b08f2b98030da6b59209

    • SSDEEP

      6144:pGxhLzIXav5wzU3oHY59KCvkg9yDUo1BfcnCMk+DI3D8+4Z2wwwxItGrKsPE7Gl:YMeis5X8gchB8CQGA+8OtGrh

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks