General

  • Target

    PROFORMA FATURA pdf.rar

  • Size

    1.2MB

  • Sample

    241204-rh4mjaxpev

  • MD5

    3ef66f216f284cded7a66df240421426

  • SHA1

    cf0b7e1214397b45d4b756ed43a5afcc5c2b9ed2

  • SHA256

    de7990d951fc7c70208e47d6f087874d20f07c3992120301ab35cfc25ab2aa0e

  • SHA512

    5025bf851ef435d1d46413458e72f52704f9bfd27f1940621ee1a9c9ccb0d5ee3376a7b240f1fff353fc1064427b777da96438278e8f59365d143be9c21dcbf3

  • SSDEEP

    24576:S8P1dog9YHCU7ZqY3/HhlGnjfeHkcz01f0OR8Gz+8BWVg2E6:S8PPh9eCU7IY3/vAjGHkO0Oi8GzMVnh

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7541747451:AAG9ox_SxDHAyEttYy3LixYmdIWollHA9VY/sendMessage?chat_id=7969902771

Targets

    • Target

      PROFORMA FATURA pdf.exe

    • Size

      1.8MB

    • MD5

      00e8ff51aeee836ba8c765d8fddef307

    • SHA1

      fb6ebb2222b4b6a328684ac51795092435ed229e

    • SHA256

      283abbd8b30c201c0c58db11b6245ebff8fff283de873e52442e3df7e373eff1

    • SHA512

      a699858a707af7acf11d0a19896aca7ba3b5e99525566bce4620580666d7f2251a502079e95fa371862bf7d8ea616bc04c01032dcb855e085da211abc0a7b8f6

    • SSDEEP

      24576:Sxis3sVkUc0TznnsGXLDT01+EuVkwaSW+xoiOkcIM1W8M8HU1C:S33sV4MDn3XLDobuCGDodF48J

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Drops startup file

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks