General

  • Target

    ff114595667cf12d185e3e147290d41d4f91b8c2a065812741e540e99c2f0db0.exe

  • Size

    976KB

  • Sample

    250110-r9cywsxndz

  • MD5

    43743091973b08e4265bb937d78d0522

  • SHA1

    142851ffb4aa49a41edb2bfb83d8459138582b27

  • SHA256

    ff114595667cf12d185e3e147290d41d4f91b8c2a065812741e540e99c2f0db0

  • SHA512

    9745ba5fdf5bb77c8ce1350a8e18e4e6fce73d8084a3b1f1db26cbdbf8b63a6cabe16de80227f93496c4eb13bac6795b2daf9af696f5da3f63983bf3dfb8c275

  • SSDEEP

    24576:1u6J33O0c+JY5UZ+XC0kGso6FaPX+8n5QU2PvhfWY:Xu0c++OCvkGs9FaPTuTEY

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot8124248958:AAHHSH6MqAJrQq3xcmINDov2O7_xgCmxgPE/sendMessage?chat_id=5808310347

Targets

    • Target

      ff114595667cf12d185e3e147290d41d4f91b8c2a065812741e540e99c2f0db0.exe

    • Size

      976KB

    • MD5

      43743091973b08e4265bb937d78d0522

    • SHA1

      142851ffb4aa49a41edb2bfb83d8459138582b27

    • SHA256

      ff114595667cf12d185e3e147290d41d4f91b8c2a065812741e540e99c2f0db0

    • SHA512

      9745ba5fdf5bb77c8ce1350a8e18e4e6fce73d8084a3b1f1db26cbdbf8b63a6cabe16de80227f93496c4eb13bac6795b2daf9af696f5da3f63983bf3dfb8c275

    • SSDEEP

      24576:1u6J33O0c+JY5UZ+XC0kGso6FaPX+8n5QU2PvhfWY:Xu0c++OCvkGs9FaPTuTEY

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks