General

  • Target

    26502teklifTR887PL783-ProductDetails663836.xlsx.exe

  • Size

    6KB

  • Sample

    241210-lq1yqasne1

  • MD5

    26d35e00a9c0b32cbed369bf309f096e

  • SHA1

    1b9b2935ecf5e458fa8a797c495a6d9e2798cd86

  • SHA256

    5d7e89b8db72156f0a75c96b371de14eb2ee4dc2148bc7a37e48b863e3ab50e3

  • SHA512

    8f8d54bf619a5ddccd41531276fa3ce34b298eb51a742bbfc2bfe01003430d85bdbcc39262384717370abfa1d8b2dbb6c823f1c190e51e546ec0f998e81cbd06

  • SSDEEP

    48:69o+1SIBzEM3UM7gT44vJhgyz6yw9/NOjWYbqYxVZeUBWpC7s03ACtDSl6AWFdhY:v9I6sTs1vJhkujWUnEUBWo7nmcxzNt

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7575386281:AAH_oCv72vkYnhVFkW8Yan64MZfx3OFkaUk/sendMessage?chat_id=5302361040

Targets

    • Target

      26502teklifTR887PL783-ProductDetails663836.xlsx.exe

    • Size

      6KB

    • MD5

      26d35e00a9c0b32cbed369bf309f096e

    • SHA1

      1b9b2935ecf5e458fa8a797c495a6d9e2798cd86

    • SHA256

      5d7e89b8db72156f0a75c96b371de14eb2ee4dc2148bc7a37e48b863e3ab50e3

    • SHA512

      8f8d54bf619a5ddccd41531276fa3ce34b298eb51a742bbfc2bfe01003430d85bdbcc39262384717370abfa1d8b2dbb6c823f1c190e51e546ec0f998e81cbd06

    • SSDEEP

      48:69o+1SIBzEM3UM7gT44vJhgyz6yw9/NOjWYbqYxVZeUBWpC7s03ACtDSl6AWFdhY:v9I6sTs1vJhkujWUnEUBWo7nmcxzNt

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Drops startup file

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks