General

  • Target

    d53a9888b375983c277dc4471f3f37e258cca57a1e242784c4130b928127c254.exe

  • Size

    542KB

  • Sample

    250110-r4tdpaxlh1

  • MD5

    857fc5f1da7948839d47abe238392ea2

  • SHA1

    8cc415a58dae52f82befc0dafd947d519a4b1574

  • SHA256

    d53a9888b375983c277dc4471f3f37e258cca57a1e242784c4130b928127c254

  • SHA512

    7aa0f11c047f5c2401b048162f5596b656872fe9bc9a20b3b674855a8ea5c31c571f196614a9c0e246394b4ea45796a82d1cbcefbe13fbee4945abc348d01a9a

  • SSDEEP

    12288:YiU+RfWk1oPD4MAQXOHx7S+r0c4rOQe9HDv24RPlA24:Yi3fW3D4v3c+r0clRjvDf

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6956304715:AAGEsKc2_BChUeZlL8X0MH3xZIsug2zAAIA/sendMessage?chat_id=6939220311

Targets

    • Target

      d53a9888b375983c277dc4471f3f37e258cca57a1e242784c4130b928127c254.exe

    • Size

      542KB

    • MD5

      857fc5f1da7948839d47abe238392ea2

    • SHA1

      8cc415a58dae52f82befc0dafd947d519a4b1574

    • SHA256

      d53a9888b375983c277dc4471f3f37e258cca57a1e242784c4130b928127c254

    • SHA512

      7aa0f11c047f5c2401b048162f5596b656872fe9bc9a20b3b674855a8ea5c31c571f196614a9c0e246394b4ea45796a82d1cbcefbe13fbee4945abc348d01a9a

    • SSDEEP

      12288:YiU+RfWk1oPD4MAQXOHx7S+r0c4rOQe9HDv24RPlA24:Yi3fW3D4v3c+r0clRjvDf

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks