General

  • Target

    Order08052300897456121.exe

  • Size

    1.1MB

  • Sample

    241126-r6g4fasjaq

  • MD5

    452d8d96c3939cdb7d971c43c90507c6

  • SHA1

    850784b8cfd6ea6417d7124be94c4d3aadf1f5ce

  • SHA256

    c1057eae2e5b0db167398f16b072ce3d291f11ba9e295d228871219f683aedcb

  • SHA512

    5c79dc64d74c62c48cff9ca05ceabff5c2f72478de1f60bf52b60868526c9a46f10f77f2936661b2e114c3113b003b87d6d9899793b476bf3c5eb8ec4a94ef82

  • SSDEEP

    24576:Vtb20pkaCqT5TBWgNQ7agLebT9kMeBUS6A:GVg5tQ7agLef9S5

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7399492470:AAF1Q52TLq6uEICFiCVrLu9dpROnjh2wukI/sendMessage?chat_id=1443320838

Targets

    • Target

      Order08052300897456121.exe

    • Size

      1.1MB

    • MD5

      452d8d96c3939cdb7d971c43c90507c6

    • SHA1

      850784b8cfd6ea6417d7124be94c4d3aadf1f5ce

    • SHA256

      c1057eae2e5b0db167398f16b072ce3d291f11ba9e295d228871219f683aedcb

    • SHA512

      5c79dc64d74c62c48cff9ca05ceabff5c2f72478de1f60bf52b60868526c9a46f10f77f2936661b2e114c3113b003b87d6d9899793b476bf3c5eb8ec4a94ef82

    • SSDEEP

      24576:Vtb20pkaCqT5TBWgNQ7agLebT9kMeBUS6A:GVg5tQ7agLef9S5

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks