General

  • Target

    979c906c8edaaafe866628eca9911b766c686da4e69d899c401b0d317b4f1628

  • Size

    480KB

  • Sample

    241213-mwyafswlas

  • MD5

    0f8fc2216d672397def371eeec7e7ab2

  • SHA1

    878e50322452353934614f673fe08e594c278062

  • SHA256

    979c906c8edaaafe866628eca9911b766c686da4e69d899c401b0d317b4f1628

  • SHA512

    71a7508ac223d76226897d60e1be76a988348fbaa102bc29741c3df847d5d541510ac7a6ecba33afe437d6849e045463f7b53fc34a55a4c296e30b7d128b0134

  • SSDEEP

    12288:bL5HNcQWMWd+H+/wg4H+HMqAA5eJjcab2jWIFsLl6wGA:b12dtwgtHMHA5eqRHFslDGA

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7924749806:AAG-WJhqQVHwMR7UVUYahs5tVC-3tNXnruE/sendMessage?chat_id=7009913093

Targets

    • Target

      979c906c8edaaafe866628eca9911b766c686da4e69d899c401b0d317b4f1628

    • Size

      480KB

    • MD5

      0f8fc2216d672397def371eeec7e7ab2

    • SHA1

      878e50322452353934614f673fe08e594c278062

    • SHA256

      979c906c8edaaafe866628eca9911b766c686da4e69d899c401b0d317b4f1628

    • SHA512

      71a7508ac223d76226897d60e1be76a988348fbaa102bc29741c3df847d5d541510ac7a6ecba33afe437d6849e045463f7b53fc34a55a4c296e30b7d128b0134

    • SSDEEP

      12288:bL5HNcQWMWd+H+/wg4H+HMqAA5eJjcab2jWIFsLl6wGA:b12dtwgtHMHA5eqRHFslDGA

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks