General

  • Target

    dekontu.exe

  • Size

    1007KB

  • Sample

    241205-kjvbxsspcp

  • MD5

    a0ccfa1aec03fb62f9d0b160206216a1

  • SHA1

    43c9ee1870d7e8418c39b91dac1cc9f84c54e60c

  • SHA256

    acfe978dd0e8daffc5e32ef3ef929ec071a0fcdc30fd0b350c23aee1f411f898

  • SHA512

    202ec9e952d670ca33206528d7f5cabf23ecfa2f32bdd1271909f89a98c40278ad00d8d1c221d8212b2e7404e28a7c3f6fe9e1d1bc53a7d0f361e7b09e24f42e

  • SSDEEP

    24576:cu6J33O0c+JY5UZ+XC0kGso6FaeatxNQzFDbmEWY:Gu0c++OCvkGs9Faeir+b0Y

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7525931722:AAHv5VReYz4Tdv44qTVu1nWYViZknndh3TU/sendMessage?chat_id=7361435574

Targets

    • Target

      dekontu.exe

    • Size

      1007KB

    • MD5

      a0ccfa1aec03fb62f9d0b160206216a1

    • SHA1

      43c9ee1870d7e8418c39b91dac1cc9f84c54e60c

    • SHA256

      acfe978dd0e8daffc5e32ef3ef929ec071a0fcdc30fd0b350c23aee1f411f898

    • SHA512

      202ec9e952d670ca33206528d7f5cabf23ecfa2f32bdd1271909f89a98c40278ad00d8d1c221d8212b2e7404e28a7c3f6fe9e1d1bc53a7d0f361e7b09e24f42e

    • SSDEEP

      24576:cu6J33O0c+JY5UZ+XC0kGso6FaeatxNQzFDbmEWY:Gu0c++OCvkGs9Faeir+b0Y

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks