General

  • Target

    f16f5b66b28bdb84d133d7d67a12f53afe5e63d805f34f797ae96a9b1006b365

  • Size

    299KB

  • Sample

    250116-p2a38a1ld1

  • MD5

    0ee67dc1e7ce20965a09c2330b8eae03

  • SHA1

    1fd4674efb9570384bdbc52a2c15ff52baf778a3

  • SHA256

    f16f5b66b28bdb84d133d7d67a12f53afe5e63d805f34f797ae96a9b1006b365

  • SHA512

    e2272ed57a44948e14d3b9b2416edb0aee04bec11a632b261e3eeec37fdda7c8e011acb15baf7fceaaa3a760695ba79d4a86f80740086248e075e2dbc90e55db

  • SSDEEP

    6144:pwolJ+HP3wHci7C4QWPREqyEnoCyxRsUw07iLYWueGh:pw12D7C4XPn5yx/7iLLLI

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7492212361:AAF_J7Ggqch6d5jLanPykrhrRKGFyphjKVo/sendMessage?chat_id=7463064549

Targets

    • Target

      Details.exe

    • Size

      577KB

    • MD5

      e328f12368b652d52f238b3a5a1948fd

    • SHA1

      e8c6c88cd87d0a65fca4a3f8cdf821995ab86872

    • SHA256

      c89709f474627c37263baf7408a5bd77b5d53ec109cccbab0ad536e89e42eefc

    • SHA512

      3372ff023614b0ca4c1828869aaff3ae054fe038ad4bfdb4e67e280de87e9f4d6fcbb834b1f49be6561a4c5980b9a1026001a177533b1e298b856bc158fe2b9a

    • SSDEEP

      12288:ZbRKjP7neRjE8lHLrddFEX6nVTsYurrpLXqvXPgd:DKjP7eW8lHLrnFEKJGrRp

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks