General

  • Target

    d87d4991c4a32c635ebb3e24e1e5aabaa92b397afe5f0c28471e97c986b21144.exe

  • Size

    128KB

  • Sample

    250110-rwaavaxjas

  • MD5

    ef77fad0f48dc9dafdb6833d92faadc3

  • SHA1

    570c28749cf913d248049b8bbe127695675d6417

  • SHA256

    d87d4991c4a32c635ebb3e24e1e5aabaa92b397afe5f0c28471e97c986b21144

  • SHA512

    2110703d533254c9aa0acf4097a289a73b87ccd1c16d7af9b40b17b47047f4826086f78ff3f807be856f1884e1071e23b88688caac258d3ee17a5d1637fb33d0

  • SSDEEP

    3072:Z99yINAgKjV545jbvk5Hbe7fMuJN07TcD1vzSF2XO9p9JbYsiTmWzwvcXrtgbY:kINAgKjV5Cjbvk5Hbe7fMuJN07T9bJis

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7979504653:AAFm_-f-R46w_TvBkt1kfgnnTRSttNIPYiY/sendMessage?chat_id=5600682828

Targets

    • Target

      d87d4991c4a32c635ebb3e24e1e5aabaa92b397afe5f0c28471e97c986b21144.exe

    • Size

      128KB

    • MD5

      ef77fad0f48dc9dafdb6833d92faadc3

    • SHA1

      570c28749cf913d248049b8bbe127695675d6417

    • SHA256

      d87d4991c4a32c635ebb3e24e1e5aabaa92b397afe5f0c28471e97c986b21144

    • SHA512

      2110703d533254c9aa0acf4097a289a73b87ccd1c16d7af9b40b17b47047f4826086f78ff3f807be856f1884e1071e23b88688caac258d3ee17a5d1637fb33d0

    • SSDEEP

      3072:Z99yINAgKjV545jbvk5Hbe7fMuJN07TcD1vzSF2XO9p9JbYsiTmWzwvcXrtgbY:kINAgKjV5Cjbvk5Hbe7fMuJN07T9bJis

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks