General

  • Target

    13d4f8ebe986653a6512cace310b4927b694a5127036d85c2d1c8840634537e4

  • Size

    1.1MB

  • Sample

    241121-vpq7katblh

  • MD5

    aaa6233ad5bf1fa876ad708b2af4d7d5

  • SHA1

    caa797aaac80a8c807e8e152f280188b8b4e8819

  • SHA256

    13d4f8ebe986653a6512cace310b4927b694a5127036d85c2d1c8840634537e4

  • SHA512

    5cab1d39f1af187bc34073052e1672cee1aa131272abae98053f2273afc9f57b573517358e110dd6b56f4653ead9ab653828c80bb408f3456f3451db901a257e

  • SSDEEP

    24576:ffmMv6Ckr7Mny5QLI2klYKlUhypdA0IJF/iog:f3v+7/5QLbkl/Uhad7I9g

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7498931539:AAE8KHb70FueL6YmOOF6rhS3Z3o-F1rx6_A/sendMessage?chat_id=1178171552

Targets

    • Target

      13d4f8ebe986653a6512cace310b4927b694a5127036d85c2d1c8840634537e4

    • Size

      1.1MB

    • MD5

      aaa6233ad5bf1fa876ad708b2af4d7d5

    • SHA1

      caa797aaac80a8c807e8e152f280188b8b4e8819

    • SHA256

      13d4f8ebe986653a6512cace310b4927b694a5127036d85c2d1c8840634537e4

    • SHA512

      5cab1d39f1af187bc34073052e1672cee1aa131272abae98053f2273afc9f57b573517358e110dd6b56f4653ead9ab653828c80bb408f3456f3451db901a257e

    • SSDEEP

      24576:ffmMv6Ckr7Mny5QLI2klYKlUhypdA0IJF/iog:f3v+7/5QLbkl/Uhad7I9g

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks