General

  • Target

    22af294596a94c94df1e13966f16af73ab4246c11866a75a7d2a095ae6a91f7eN.exe

  • Size

    1.0MB

  • Sample

    241222-hnxxhayjex

  • MD5

    988f9a70417a5ee4f7d4d3e0b3ed71f0

  • SHA1

    4a1b003b6bd958160d3f27cb362ed8230f83f842

  • SHA256

    22af294596a94c94df1e13966f16af73ab4246c11866a75a7d2a095ae6a91f7e

  • SHA512

    d087b8f4d40fc9ea89eb6720274c8d6b39bf861710c0c939b24aa3f0f5c8bd78b3c7866acd5712cb130a5369b10524ed3666b85072ea57af389ca4146e531701

  • SSDEEP

    24576:lqDEvCTbMWu7rQYlBQcBiT6rprG8aAouMe:lTvC/MTQYxsWR7aA

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7249279970:AAEcJhrnjOjEPF0_qNK65RAY0sYYfNqc0Sg/sendMessage?chat_id=7365454061

Targets

    • Target

      22af294596a94c94df1e13966f16af73ab4246c11866a75a7d2a095ae6a91f7eN.exe

    • Size

      1.0MB

    • MD5

      988f9a70417a5ee4f7d4d3e0b3ed71f0

    • SHA1

      4a1b003b6bd958160d3f27cb362ed8230f83f842

    • SHA256

      22af294596a94c94df1e13966f16af73ab4246c11866a75a7d2a095ae6a91f7e

    • SHA512

      d087b8f4d40fc9ea89eb6720274c8d6b39bf861710c0c939b24aa3f0f5c8bd78b3c7866acd5712cb130a5369b10524ed3666b85072ea57af389ca4146e531701

    • SSDEEP

      24576:lqDEvCTbMWu7rQYlBQcBiT6rprG8aAouMe:lTvC/MTQYxsWR7aA

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks