General

  • Target

    f6d76bf6feb1be1dc008241ebe7f1378d4125b9e60357485124b4af9748dce13.exe

  • Size

    1.0MB

  • Sample

    250110-sa37gazndm

  • MD5

    746eef70bac7aba1b57e9821e5d3010f

  • SHA1

    253b25f0fa35132910a026abe1bd18c58b9a2145

  • SHA256

    f6d76bf6feb1be1dc008241ebe7f1378d4125b9e60357485124b4af9748dce13

  • SHA512

    92bd305113d6f9538e7ddafd6cb931c74feed87051cb6ef60ed342b8f83dba5dd52be417805e898fd2a1110725dca8865ee24846d9ae75bcd697b72a79c8beb2

  • SSDEEP

    24576:LqDEvCTbMWu7rQYlBQcBiT6rprG8aHRk:LTvC/MTQYxsWR7aH

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7525931722:AAHv5VReYz4Tdv44qTVu1nWYViZknndh3TU/sendMessage?chat_id=7361435574

Targets

    • Target

      f6d76bf6feb1be1dc008241ebe7f1378d4125b9e60357485124b4af9748dce13.exe

    • Size

      1.0MB

    • MD5

      746eef70bac7aba1b57e9821e5d3010f

    • SHA1

      253b25f0fa35132910a026abe1bd18c58b9a2145

    • SHA256

      f6d76bf6feb1be1dc008241ebe7f1378d4125b9e60357485124b4af9748dce13

    • SHA512

      92bd305113d6f9538e7ddafd6cb931c74feed87051cb6ef60ed342b8f83dba5dd52be417805e898fd2a1110725dca8865ee24846d9ae75bcd697b72a79c8beb2

    • SSDEEP

      24576:LqDEvCTbMWu7rQYlBQcBiT6rprG8aHRk:LTvC/MTQYxsWR7aH

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks