General

  • Target

    a7ac92c130b490bf02e9e87922d0a4e45735b7478915a0f687d8fbb2e1d90c00

  • Size

    326KB

  • Sample

    241210-fkbtratret

  • MD5

    b9bbf526eef810b198dc2928008326bc

  • SHA1

    d081556aaeab78c0ebf99d81cc101229cd7fd100

  • SHA256

    a7ac92c130b490bf02e9e87922d0a4e45735b7478915a0f687d8fbb2e1d90c00

  • SHA512

    7ba5f8c895df89c2de930f558d8ce00e0c88c51c279bbf0a048cd2c2d581201d09ff330c28b8fe192f819e61a4e7e1de1507c54a8aef60dd86dd2d97e1f9c4d9

  • SSDEEP

    6144:INc502uT99A0J2psf9gyWCj44LF6sbRb9WRuwjZ3TcK4ElpuVsGVxMV678:INk0dA0X1x/1LYuwFAEloyGnyR

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot8043217727:AAHet_KMDJubZguJgq0Cp7yrQCzgcnbbXpU/sendMessage?chat_id=6247294228

Targets

    • Target

      vessel particulars.exe

    • Size

      540KB

    • MD5

      74d70f8356487059e8162b3d95477890

    • SHA1

      e579054b9325db2af1b137daf424df95f71cd97f

    • SHA256

      2c2a013dbc6d7012967ca889d283b0b572e7ca4cf3ac39e9e21ba27e60893996

    • SHA512

      1bafd419b3ab6c260d0ca1893688c411f7a07209358f939edbacbdfd277e507f7a933d88c29df3e2d56eb8db12b72c535701a5068e69ad870aebd3f157a5cf0e

    • SSDEEP

      12288:oiU+RfWk1j15DQZC4oiEMxYWiy2XQ4RPlA24:oi3fWi2ZC41Ejy2Xpf

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks