General

  • Target

    698460c425a25a679f4810434424ae3bed1615f38502e53f1dfd7969034656af

  • Size

    625KB

  • Sample

    241127-jxr82s1qfr

  • MD5

    6e6a0abf83664ca36145be65dd190adb

  • SHA1

    d4024641c4becafb3319d6b4577f34dfbe227133

  • SHA256

    698460c425a25a679f4810434424ae3bed1615f38502e53f1dfd7969034656af

  • SHA512

    c3972f5fded7e80d650d5ce077dd0ac5eb0d298b0a68b974ba4b690665443985cebee842bf6e246a5000a6470a122749ed39b940e646fa28c83219631439dfa8

  • SSDEEP

    12288:rj9FDPEGMBIl91xAJlq4e7yaj51La027E6s9qzCbVcJXOr5Ze2bURACBjXTo/f:v3DPEGMBS9IJlqlt1WCbVcJUZWu6jXTy

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7399492470:AAF1Q52TLq6uEICFiCVrLu9dpROnjh2wukI/sendMessage?chat_id=1443320838

Targets

    • Target

      INQUIRY SPM-2412547 [W_ID36-61442].exe

    • Size

      1.1MB

    • MD5

      064a3d834a62d73b76d9c91e36b98e05

    • SHA1

      c036160cb0ff789a41b21a75b4fc47cd718f49bc

    • SHA256

      b821ff32a1b0314cfa230a212103305d18695e4c95e3d94fd69097db8019833c

    • SHA512

      9d65b5f225261e764f74db0755bad4156cb5c3fd897510477945ca23fa220df324891b4a6719cd935196f3ae0186483a183bd5d7df461cd705863307337d7ebe

    • SSDEEP

      24576:9tb20pkaCqT5TBWgNQ7aExRr0EEFcdo6A:uVg5tQ7aExReFN5

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks