General

  • Target

    62bf34501335a0d0ab097a91a61af8020b34eabfa74c6053515244ba601aa367.img

  • Size

    464KB

  • Sample

    250117-fkycrasnhw

  • MD5

    d44bc5b073e701467c2af2889dc2687f

  • SHA1

    1d9f9d3d59d13e70221fb6b6d5e22a6fab471dc9

  • SHA256

    62bf34501335a0d0ab097a91a61af8020b34eabfa74c6053515244ba601aa367

  • SHA512

    cb6eae2a5526e3ea94ba8e9ad380b03d66c92aec475126db1ba3342a8fb8c04652677655d06e240187323669a57bfa611e69d22e202485fb0c96b1f7fabf9d0a

  • SSDEEP

    6144:OTErM9in42rv0JkLKpmNG4IST9K+WGCIe8zpDmStL0qGV0lT+BU/rHFV1euZbIus:394284IS8RODRXkupCuqtaZd

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7307271992:AAF4MiqD71uea9mzZkKlV2piolfd9UoXP7A/sendMessage?chat_id=1018401531

Targets

    • Target

      Faktura VAT-FV2025011500091._pdf .scr

    • Size

      403KB

    • MD5

      d1ce79b1ed07c976f65e3f715eebb42d

    • SHA1

      86fd4ef7598e6795379361a3bc931a6fa446cd4b

    • SHA256

      b0da8ee7ba9f7867231c71a57402f66ee0a42b89fb130768a680cd0f5c6bbfe7

    • SHA512

      51e49160cc915cad92a260bf58ecb7997890336d4402334952069d975cd9ceba17eee7e4e88d99459d81f45d03291c930aad0cd3a65bbe3c65f6e05ba63885c9

    • SSDEEP

      6144:8TErM9in42rv0JkLKpmNG4IST9K+WGCIe8zpDmStL0qGV0lT+BU/rHFV1euZbIus:N94284IS8RODRXkupCuqtaZd

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks