General

  • Target

    88ec98143583ec8e9c2ab137463322ce04bfb1a03f112fe1fb0d09ad502a1429.exe

  • Size

    131KB

  • Sample

    250110-r1clrszjhm

  • MD5

    0a6d497237dc22f74fa9eb514ef6aef1

  • SHA1

    99ced63b28ed88283f8b293d1a4804acb22cf01c

  • SHA256

    88ec98143583ec8e9c2ab137463322ce04bfb1a03f112fe1fb0d09ad502a1429

  • SHA512

    4764ea38a57f5617ef748bc52cb9c6a0aa8c435dfd6dfdec993ecf113d3bd1e413b95c49b94424e5eb9256f525328746a894f8322ca8a4a3817a6c6a1243c6c3

  • SSDEEP

    3072:y99yINAgKjV545jbvk5Hbe7fMuJN07TBqKj+EmfJ9K4b5bPmmmWMIwvcXvQgbY:1INAgKjV5Cjbvk5Hbe7fMuJN07T49K49

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7692220058:AAEny12fSzuKXI7iNJaESECu5UR80nmwLAQ/sendMessage?chat_id=7342994424

Targets

    • Target

      88ec98143583ec8e9c2ab137463322ce04bfb1a03f112fe1fb0d09ad502a1429.exe

    • Size

      131KB

    • MD5

      0a6d497237dc22f74fa9eb514ef6aef1

    • SHA1

      99ced63b28ed88283f8b293d1a4804acb22cf01c

    • SHA256

      88ec98143583ec8e9c2ab137463322ce04bfb1a03f112fe1fb0d09ad502a1429

    • SHA512

      4764ea38a57f5617ef748bc52cb9c6a0aa8c435dfd6dfdec993ecf113d3bd1e413b95c49b94424e5eb9256f525328746a894f8322ca8a4a3817a6c6a1243c6c3

    • SSDEEP

      3072:y99yINAgKjV545jbvk5Hbe7fMuJN07TBqKj+EmfJ9K4b5bPmmmWMIwvcXvQgbY:1INAgKjV5Cjbvk5Hbe7fMuJN07T49K49

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Deletes itself

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks