General

  • Target

    de7e8561b2cf84f247a1f76a1fb4f1a53b5fd18b093d880bf563fd1b55a97d71.exe

  • Size

    1001KB

  • Sample

    250110-rgratawmg1

  • MD5

    10f089d7b9e39a47f1ba6e9ca2086d25

  • SHA1

    9fd173cf8141ed645d09cf87ccd569994c926eff

  • SHA256

    de7e8561b2cf84f247a1f76a1fb4f1a53b5fd18b093d880bf563fd1b55a97d71

  • SHA512

    2e7ad3ef6f8bc4ab620974450e85eb96307952a118c36637b653a3330d495f87c8c88f1c07e33117b130501761ddd42273897f62c083396058b3a2c0b931080a

  • SSDEEP

    24576:4tb20pkaCqT5TBWgNQ7aq93uFD82aSx6A:BVg5tQ7aqaTaa5

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7591642187:AAF3F6-zxp3HwWsP9s4_QJW4W-aEGhjsvDI/sendMessage?chat_id=6557702940

Targets

    • Target

      de7e8561b2cf84f247a1f76a1fb4f1a53b5fd18b093d880bf563fd1b55a97d71.exe

    • Size

      1001KB

    • MD5

      10f089d7b9e39a47f1ba6e9ca2086d25

    • SHA1

      9fd173cf8141ed645d09cf87ccd569994c926eff

    • SHA256

      de7e8561b2cf84f247a1f76a1fb4f1a53b5fd18b093d880bf563fd1b55a97d71

    • SHA512

      2e7ad3ef6f8bc4ab620974450e85eb96307952a118c36637b653a3330d495f87c8c88f1c07e33117b130501761ddd42273897f62c083396058b3a2c0b931080a

    • SSDEEP

      24576:4tb20pkaCqT5TBWgNQ7aq93uFD82aSx6A:BVg5tQ7aqaTaa5

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks