General

  • Target

    55427a10e215f7f9ddbae56b7ccbbd3ced81a03d494669d27fa87bd0c72ef52e

  • Size

    365KB

  • Sample

    241127-dg5xbatmdy

  • MD5

    a3f7a1e99195ae9260487c6b09a9bb9b

  • SHA1

    513faf51cef0d52e8946cf4c6e3ca26e214f7e78

  • SHA256

    55427a10e215f7f9ddbae56b7ccbbd3ced81a03d494669d27fa87bd0c72ef52e

  • SHA512

    dda057f766ea7ea3103d5b9e9db7028d4b4ecdb2aa660fef37f774fed1587b757a6f454a4d16872833902cd1163aad73ad1a137f5af04f42fb11809a62381fab

  • SSDEEP

    6144:UM8TV7mEwnTU0hFTSGLT8a4uTJvXytuBDv9Qw2uyqZHSbA78FqF2Fp1Kb4mgDFPA:UMK1mEoU0hVP8s1xBBRXZyb9q0F6b4mX

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7942215170:AAFCB6RsSfZIDvTqBntk3AScbXsHFZz3mf8/sendMessage?chat_id=2135869667

Targets

    • Target

      MT Griya Bugis Agency Appointment.exe

    • Size

      685KB

    • MD5

      bae2409b9a15978efbbb6e9b2efac95d

    • SHA1

      dc97a0db7a64f1aaf64c1f91ad2af04c962a5a8b

    • SHA256

      335a4d0cba30db171813535723437e49fef1ca6adb02d8e201742dee4fb07242

    • SHA512

      67cac5e7cbb21e6972c6786088e889f43739399b99b67b3118d4996413b7a6a52b758c3485ae0a68e216985759d37060ff8a6171079372ebda01e48c34dca07e

    • SSDEEP

      12288:A1obJvDjvOo4V+tPQdx81IYaHMqL6AwETv:AoBDjvZRPQsEsqbBTv

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks