General

  • Target

    b37e686fd31a86e8ace7bac6a862b1388241527af590a168c294801cfbecd5b1.exe

  • Size

    810KB

  • Sample

    250114-dj4f9svmdv

  • MD5

    f614cd44a2ca0676523d3f9d23ae23b2

  • SHA1

    c5656616f7095e6b19c995b2528c984234d8e3ed

  • SHA256

    b37e686fd31a86e8ace7bac6a862b1388241527af590a168c294801cfbecd5b1

  • SHA512

    e063b7b06d685c2244157ae397cd1d083860478cec387c852da40fc3b472e6b540649ea9399e3cdf867925c772fc0abdea43ff832b506c73b3d5487d6638c8b6

  • SSDEEP

    12288:9aMaSzOKy2r7SPN/Mvy6URfiMCF9vEgAPdeaikpipP:MMaSSKy2/SPN/GBUIabdea4

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7888110857:AAH_lE30nomQfyzYUPPXbGWeGI9ffBUijsQ/sendMessage?chat_id=7222025033

Targets

    • Target

      b37e686fd31a86e8ace7bac6a862b1388241527af590a168c294801cfbecd5b1.exe

    • Size

      810KB

    • MD5

      f614cd44a2ca0676523d3f9d23ae23b2

    • SHA1

      c5656616f7095e6b19c995b2528c984234d8e3ed

    • SHA256

      b37e686fd31a86e8ace7bac6a862b1388241527af590a168c294801cfbecd5b1

    • SHA512

      e063b7b06d685c2244157ae397cd1d083860478cec387c852da40fc3b472e6b540649ea9399e3cdf867925c772fc0abdea43ff832b506c73b3d5487d6638c8b6

    • SSDEEP

      12288:9aMaSzOKy2r7SPN/Mvy6URfiMCF9vEgAPdeaikpipP:MMaSSKy2/SPN/GBUIabdea4

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Drops startup file

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks