General

  • Target

    ec7e65973643c54403120f62a46f75b10ce3717c54f98435f764964f9c0115ee.exe

  • Size

    1.1MB

  • Sample

    241126-d5ttyssmbt

  • MD5

    c30f0328acefe083da339f7969a0fc3f

  • SHA1

    c87d4ebc83d8efa8fa31e60f79e83205d436803c

  • SHA256

    ec7e65973643c54403120f62a46f75b10ce3717c54f98435f764964f9c0115ee

  • SHA512

    9c3231702c24a151c938dffc7bf16338881c0c94ce09537f24ecbf0d1ba3469fe6bb89264a8fbaa2782cf59e8582d9eea85e6c4bd1a965786478df6b97d7b427

  • SSDEEP

    24576:0tb20pkaCqT5TBWgNQ7al/psVTZa7VVxVxo6A:dVg5tQ7al/puZa7Vjc5

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7399492470:AAF1Q52TLq6uEICFiCVrLu9dpROnjh2wukI/sendMessage?chat_id=1443320838

Targets

    • Target

      ec7e65973643c54403120f62a46f75b10ce3717c54f98435f764964f9c0115ee.exe

    • Size

      1.1MB

    • MD5

      c30f0328acefe083da339f7969a0fc3f

    • SHA1

      c87d4ebc83d8efa8fa31e60f79e83205d436803c

    • SHA256

      ec7e65973643c54403120f62a46f75b10ce3717c54f98435f764964f9c0115ee

    • SHA512

      9c3231702c24a151c938dffc7bf16338881c0c94ce09537f24ecbf0d1ba3469fe6bb89264a8fbaa2782cf59e8582d9eea85e6c4bd1a965786478df6b97d7b427

    • SSDEEP

      24576:0tb20pkaCqT5TBWgNQ7al/psVTZa7VVxVxo6A:dVg5tQ7al/puZa7Vjc5

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks