General

  • Target

    SOA SEP 2024.exe

  • Size

    1.1MB

  • Sample

    241122-hjmkzawkdy

  • MD5

    3463c053c39de2170aa78b8aa253e999

  • SHA1

    e40e4169c635a3a34acb63928ad2ce89089a52fe

  • SHA256

    4b53b5e5756b9b3f43e32650b65590d0fe529e653a469b361df4bcf710b4e943

  • SHA512

    6a6a5376213f65070e5160ba34f7a7e3f44dc6c8e0e9f8205c3d5ba7dd402c0a372d42dd3a2899f7fce4eef3e5d879d64f41246d7a5139785278935e7315d82c

  • SSDEEP

    24576:htb20pkaCqT5TBWgNQ7aMqEpVK5aXVF6tw6A:yVg5tQ7aM+5KIW5

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7399492470:AAF1Q52TLq6uEICFiCVrLu9dpROnjh2wukI/sendMessage?chat_id=1443320838

Targets

    • Target

      SOA SEP 2024.exe

    • Size

      1.1MB

    • MD5

      3463c053c39de2170aa78b8aa253e999

    • SHA1

      e40e4169c635a3a34acb63928ad2ce89089a52fe

    • SHA256

      4b53b5e5756b9b3f43e32650b65590d0fe529e653a469b361df4bcf710b4e943

    • SHA512

      6a6a5376213f65070e5160ba34f7a7e3f44dc6c8e0e9f8205c3d5ba7dd402c0a372d42dd3a2899f7fce4eef3e5d879d64f41246d7a5139785278935e7315d82c

    • SSDEEP

      24576:htb20pkaCqT5TBWgNQ7aMqEpVK5aXVF6tw6A:yVg5tQ7aM+5KIW5

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks