General

  • Target

    df48b21ceb09cc696a760edb83b83d28ecc32fdc8936001bcd711adbfa229327.img

  • Size

    132KB

  • Sample

    250117-hgvtkavqdx

  • MD5

    04d566367a6079a6bdf0331d4f4c35ff

  • SHA1

    eedd3db9e3da4c1b58c0ebed004992c3439a8926

  • SHA256

    df48b21ceb09cc696a760edb83b83d28ecc32fdc8936001bcd711adbfa229327

  • SHA512

    baa0f60198a1e9b05cdb1eef9ae4cbd3a38700160985cee4429d38f471b3ea688eec4afb6dc72af1ec1ebee416577b25e7e76af0a8589b84bfdfafd51da6f8a5

  • SSDEEP

    1536:i88lDhBttnpa7DvJ6/Vx7Si40gCs3CWpQ1QKqWI6Oac:aJ33nSDvJqVWLCjWpLKjIOc

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7500935106:AAHefL_Tof6QlJbfgUl9eKB1_ggGz2K7LgY/sendMessage?chat_id=1018401531

Targets

    • Target

      FA_35_01_2025_STA_Wzór_standard_pdf .scr

    • Size

      70KB

    • MD5

      c264894ed58fdb81e565236476bfe7ca

    • SHA1

      9f64388e03f8162ecca1ec6620b52b1a586ea369

    • SHA256

      6b5d2ed235ccf7757a7144116baf1376abfd13b7fa5d87d130db3af889c72a51

    • SHA512

      4f2ad5466c7da243758b9900de3e0897b04299622aa23adaf5be92f3dc1ac9b3ddd06d2fd5b36ca37d884fe17ae49d608cc407b782e89b1eda7d215c9358bee1

    • SSDEEP

      1536:Z88lDhBttnpa7DvJ6/Vx7Si40gCs3CWpQ1QKqWI6Oac:BJ33nSDvJqVWLCjWpLKjIOc

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks