General

  • Target

    516c5e66abd3c3bc4e881fff254fa133df99c67db61698d924e96920ac1dee65.rar

  • Size

    506KB

  • Sample

    241129-dtyzjasjhx

  • MD5

    614dd6711a599e1b8f6a5d75b48148a2

  • SHA1

    31d39cb6167d7fcaf430863a200967df42d64cdf

  • SHA256

    516c5e66abd3c3bc4e881fff254fa133df99c67db61698d924e96920ac1dee65

  • SHA512

    7f78574613c378f1a6f41444edc6bee416e049df15dc825bb677932991c7c3a56ff96897295937c8bea090babf92ab79064a611bc53efd9287bb824fbd8780b1

  • SSDEEP

    12288:EIUENXuTpyw1QOVEU5gCQFlNmquH1PCWQX8VsvmOvtJN:eE8pZ1kEgC4bmqCP+X8a/F

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7578088265:AAHvd5E9MBWeIBV2JVvDWdTRg0KYKBSK8MM/sendMessage?chat_id=7365454061

Targets

    • Target

      ZM-Z_2024-000343__SKM-0_000.exe

    • Size

      983KB

    • MD5

      aa90694a5cc7243dd249a056818a80ea

    • SHA1

      aea0366ac02f19c0ea79053eb51f52f1949ea413

    • SHA256

      47f122f668c4791cf3795a7c76e7f3682283bae4efd499d200bd80cc164b8948

    • SHA512

      6c63e8a1eedd35fc22329554e1fabbf4cd6a5e3715a285941387ed9aba363b69c15cd102c441b06d1ea761525b62f188eb686b7778387d3f1e8b8ed5657087a8

    • SSDEEP

      24576:Wtb20pkaCqT5TBWgNQ7a/ri1qXiYiU96A:DVg5tQ7a/ri1PYiI5

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks