General

  • Target

    03da1152cc2fc2bcfafc441c76ddcda09e4df84adb27bda9b267694b4a840cf7.exe

  • Size

    998KB

  • Sample

    250110-rh311awnes

  • MD5

    04a2cce147e8b29d89ef24af80d493ce

  • SHA1

    5e24a62c496a9726bb924c1bb0f3b5e33963b0c6

  • SHA256

    03da1152cc2fc2bcfafc441c76ddcda09e4df84adb27bda9b267694b4a840cf7

  • SHA512

    5c623045f3b388f150fe1659d55da24d89c35aef09d74a3a5fc90431608241213c9e9a64af118cc1caf1601a3effb1fb572d1c98c2c6695db1349e54fb2e1b22

  • SSDEEP

    24576:+u6J33O0c+JY5UZ+XC0kGso6Faei2PbeZqC/pO0WY:Qu0c++OCvkGs9FaeTP6MY

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7767004773:AAG_mBqrFYZNr81F28ktwLAJ3brPq5BTRzg/sendMessage?chat_id=1217600190

Targets

    • Target

      03da1152cc2fc2bcfafc441c76ddcda09e4df84adb27bda9b267694b4a840cf7.exe

    • Size

      998KB

    • MD5

      04a2cce147e8b29d89ef24af80d493ce

    • SHA1

      5e24a62c496a9726bb924c1bb0f3b5e33963b0c6

    • SHA256

      03da1152cc2fc2bcfafc441c76ddcda09e4df84adb27bda9b267694b4a840cf7

    • SHA512

      5c623045f3b388f150fe1659d55da24d89c35aef09d74a3a5fc90431608241213c9e9a64af118cc1caf1601a3effb1fb572d1c98c2c6695db1349e54fb2e1b22

    • SSDEEP

      24576:+u6J33O0c+JY5UZ+XC0kGso6Faei2PbeZqC/pO0WY:Qu0c++OCvkGs9FaeTP6MY

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks