General

  • Target

    35c3bb009e452f96d12f08807cd4b689855e77215893c9c19aafd7569596094c

  • Size

    6KB

  • Sample

    241211-zpdnpasnam

  • MD5

    26d84053046215e0e938ad51bea23989

  • SHA1

    4858798c04d7938ca2821b5ae9a8e7fa4a949ef4

  • SHA256

    35c3bb009e452f96d12f08807cd4b689855e77215893c9c19aafd7569596094c

  • SHA512

    cbcf459a344d29a94eaae7c3b8f00bf3e0997e91dfc2dcce7c490c56485afa07bff0a9b9d3713af9cacc7405a2e6d6b4bbca0fd86ea8179130b0374da434334a

  • SSDEEP

    48:66o+1ZV71cIxePbGaeDC9gvz6ew9/NOjwYrYO9VMI40qclsu3ACtD+le0aFdhpfG:GuFxaiaeDCjujBP3hqu1qwRzNt

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7575386281:AAH_oCv72vkYnhVFkW8Yan64MZfx3OFkaUk/sendMessage?chat_id=5302361040

Targets

    • Target

      35c3bb009e452f96d12f08807cd4b689855e77215893c9c19aafd7569596094c

    • Size

      6KB

    • MD5

      26d84053046215e0e938ad51bea23989

    • SHA1

      4858798c04d7938ca2821b5ae9a8e7fa4a949ef4

    • SHA256

      35c3bb009e452f96d12f08807cd4b689855e77215893c9c19aafd7569596094c

    • SHA512

      cbcf459a344d29a94eaae7c3b8f00bf3e0997e91dfc2dcce7c490c56485afa07bff0a9b9d3713af9cacc7405a2e6d6b4bbca0fd86ea8179130b0374da434334a

    • SSDEEP

      48:66o+1ZV71cIxePbGaeDC9gvz6ew9/NOjwYrYO9VMI40qclsu3ACtD+le0aFdhpfG:GuFxaiaeDCjujBP3hqu1qwRzNt

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Drops startup file

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks