General

  • Target

    a1d084c5e89063825e6c866845ee8643a76e1f337880fd0852402bc8d714a7c7.exe

  • Size

    1.0MB

  • Sample

    241222-afxyjavqcq

  • MD5

    1f0e9cdd4105d32138f3df2510c94e21

  • SHA1

    82ee58715ae7cd9ca42070e942b77f3691e52c2c

  • SHA256

    a1d084c5e89063825e6c866845ee8643a76e1f337880fd0852402bc8d714a7c7

  • SHA512

    13ad4f7bb2841ae17c53266d07d3172dbf33f1d418515681662be7ce87bdbc7f67ffb9fee1233732f80d1c82bec5cf7a5f770f096b8105f60297a4affd061b54

  • SSDEEP

    24576:lqDEvCTbMWu7rQYlBQcBiT6rprG8aAouMeM:lTvC/MTQYxsWR7aAU

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7249279970:AAEcJhrnjOjEPF0_qNK65RAY0sYYfNqc0Sg/sendMessage?chat_id=7365454061

Targets

    • Target

      a1d084c5e89063825e6c866845ee8643a76e1f337880fd0852402bc8d714a7c7.exe

    • Size

      1.0MB

    • MD5

      1f0e9cdd4105d32138f3df2510c94e21

    • SHA1

      82ee58715ae7cd9ca42070e942b77f3691e52c2c

    • SHA256

      a1d084c5e89063825e6c866845ee8643a76e1f337880fd0852402bc8d714a7c7

    • SHA512

      13ad4f7bb2841ae17c53266d07d3172dbf33f1d418515681662be7ce87bdbc7f67ffb9fee1233732f80d1c82bec5cf7a5f770f096b8105f60297a4affd061b54

    • SSDEEP

      24576:lqDEvCTbMWu7rQYlBQcBiT6rprG8aAouMeM:lTvC/MTQYxsWR7aAU

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks