General

  • Target

    RECEIPT DATED 28.11.2024,pdf.exe

  • Size

    978KB

  • Sample

    241128-x4ylasxmfs

  • MD5

    53699fc6f42ae5922ed39558c20e5a49

  • SHA1

    1ca134a30c20b59faa40d0ff423b0097ebffc890

  • SHA256

    a34887afea413ee213c59e09cefd8343dd9c606c2c5c41022707412788fafe52

  • SHA512

    45b164e4eff353b29b0c2308536d24e42c943b313f564964051dd21d0248d0b58ae1ece11dd99cab5470742b81afc9702f6647a3329486765e4d225edc22df0d

  • SSDEEP

    12288:Jtb20Qc3lT7af41ePBRYuQLKpqeUhbTv5OFgNuPPpHSgafTBi+XQFdYEyc6A:Jtb20pkaCqT5TBWgNQ7a7BTg7Yxc6A

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot8105461233:AAGikrL-FY3clQOY-lg3KOIDOXSLgX28_TU/sendMessage?chat_id=6147266367

Targets

    • Target

      RECEIPT DATED 28.11.2024,pdf.exe

    • Size

      978KB

    • MD5

      53699fc6f42ae5922ed39558c20e5a49

    • SHA1

      1ca134a30c20b59faa40d0ff423b0097ebffc890

    • SHA256

      a34887afea413ee213c59e09cefd8343dd9c606c2c5c41022707412788fafe52

    • SHA512

      45b164e4eff353b29b0c2308536d24e42c943b313f564964051dd21d0248d0b58ae1ece11dd99cab5470742b81afc9702f6647a3329486765e4d225edc22df0d

    • SSDEEP

      12288:Jtb20Qc3lT7af41ePBRYuQLKpqeUhbTv5OFgNuPPpHSgafTBi+XQFdYEyc6A:Jtb20pkaCqT5TBWgNQ7a7BTg7Yxc6A

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.