General

  • Target

    54f08d458c3a9b5b6553e6bc6810fd9071d7bc2a517576d4dcc45b1ca0a47d1fN.exe

  • Size

    545KB

  • Sample

    241210-xrm9sszjel

  • MD5

    47310e2d76477f79641f8703027a60b0

  • SHA1

    bba7157bfab11d11b6912cb0012e117de61d175a

  • SHA256

    54f08d458c3a9b5b6553e6bc6810fd9071d7bc2a517576d4dcc45b1ca0a47d1f

  • SHA512

    ccf55e9915002e828feec50c58ec1ccac378c0b1a1e081e5b2e542457ff4a2866aebaeeeb40bfe6188938b4e1dc0bc1c770e33a012752d28429f8b14ed7fb7f7

  • SSDEEP

    12288:NquErHF6xC9D6DmR1J98w4oknqOOCyQfZYQignEMlsFqqYJiWn1:wrl6kD68JmlotQfZsgnEHPWn1

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot1628099890:AAEoyPqXzUZV0NK78yRGbDMLJqRw0vcASbg/sendMessage?chat_id=1217600190

Targets

    • Target

      54f08d458c3a9b5b6553e6bc6810fd9071d7bc2a517576d4dcc45b1ca0a47d1fN.exe

    • Size

      545KB

    • MD5

      47310e2d76477f79641f8703027a60b0

    • SHA1

      bba7157bfab11d11b6912cb0012e117de61d175a

    • SHA256

      54f08d458c3a9b5b6553e6bc6810fd9071d7bc2a517576d4dcc45b1ca0a47d1f

    • SHA512

      ccf55e9915002e828feec50c58ec1ccac378c0b1a1e081e5b2e542457ff4a2866aebaeeeb40bfe6188938b4e1dc0bc1c770e33a012752d28429f8b14ed7fb7f7

    • SSDEEP

      12288:NquErHF6xC9D6DmR1J98w4oknqOOCyQfZYQignEMlsFqqYJiWn1:wrl6kD68JmlotQfZsgnEHPWn1

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks