General

  • Target

    9ecf236ec618eebbd3301ef42f21ff2b9b1fee074bb9484459185f1707096fb2N.exe

  • Size

    1.0MB

  • Sample

    241222-f9l11swldj

  • MD5

    4b1148f91cdb0665dd54334970d0dce0

  • SHA1

    f66559e2a2e4052b84536c4d19dbaecfc3b06c9a

  • SHA256

    9ecf236ec618eebbd3301ef42f21ff2b9b1fee074bb9484459185f1707096fb2

  • SHA512

    e23fde6904fcebababcd49a1b8d3b908fdf291dd69a6966a275aa0b1f1a2d0572afa79e0e124523d84ebfad783cc89fafc33c82ebd7f2ca0bb3455c53345c7b5

  • SSDEEP

    24576:qqDEvCTbMWu7rQYlBQcBiT6rprG8ax6YEjTi:qTvC/MTQYxsWR7ax43

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot8124248958:AAHHSH6MqAJrQq3xcmINDov2O7_xgCmxgPE/sendMessage?chat_id=5808310347

Targets

    • Target

      9ecf236ec618eebbd3301ef42f21ff2b9b1fee074bb9484459185f1707096fb2N.exe

    • Size

      1.0MB

    • MD5

      4b1148f91cdb0665dd54334970d0dce0

    • SHA1

      f66559e2a2e4052b84536c4d19dbaecfc3b06c9a

    • SHA256

      9ecf236ec618eebbd3301ef42f21ff2b9b1fee074bb9484459185f1707096fb2

    • SHA512

      e23fde6904fcebababcd49a1b8d3b908fdf291dd69a6966a275aa0b1f1a2d0572afa79e0e124523d84ebfad783cc89fafc33c82ebd7f2ca0bb3455c53345c7b5

    • SSDEEP

      24576:qqDEvCTbMWu7rQYlBQcBiT6rprG8ax6YEjTi:qTvC/MTQYxsWR7ax43

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks