General

  • Target

    c89709f474627c37263baf7408a5bd77b5d53ec109cccbab0ad536e89e42eefc.exe

  • Size

    577KB

  • Sample

    250117-hdmc1swmak

  • MD5

    e328f12368b652d52f238b3a5a1948fd

  • SHA1

    e8c6c88cd87d0a65fca4a3f8cdf821995ab86872

  • SHA256

    c89709f474627c37263baf7408a5bd77b5d53ec109cccbab0ad536e89e42eefc

  • SHA512

    3372ff023614b0ca4c1828869aaff3ae054fe038ad4bfdb4e67e280de87e9f4d6fcbb834b1f49be6561a4c5980b9a1026001a177533b1e298b856bc158fe2b9a

  • SSDEEP

    12288:ZbRKjP7neRjE8lHLrddFEX6nVTsYurrpLXqvXPgd:DKjP7eW8lHLrnFEKJGrRp

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7492212361:AAF_J7Ggqch6d5jLanPykrhrRKGFyphjKVo/sendMessage?chat_id=7463064549

Targets

    • Target

      c89709f474627c37263baf7408a5bd77b5d53ec109cccbab0ad536e89e42eefc.exe

    • Size

      577KB

    • MD5

      e328f12368b652d52f238b3a5a1948fd

    • SHA1

      e8c6c88cd87d0a65fca4a3f8cdf821995ab86872

    • SHA256

      c89709f474627c37263baf7408a5bd77b5d53ec109cccbab0ad536e89e42eefc

    • SHA512

      3372ff023614b0ca4c1828869aaff3ae054fe038ad4bfdb4e67e280de87e9f4d6fcbb834b1f49be6561a4c5980b9a1026001a177533b1e298b856bc158fe2b9a

    • SSDEEP

      12288:ZbRKjP7neRjE8lHLrddFEX6nVTsYurrpLXqvXPgd:DKjP7eW8lHLrnFEKJGrRp

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks