General

  • Target

    MTNP240444042266.exe

  • Size

    587KB

  • Sample

    250122-jzze5swpht

  • MD5

    9f9e89382132182cde0649f42b2b3d48

  • SHA1

    31f54a2f7211f87081ce0ace0ba877c44ec07498

  • SHA256

    f68aec391b587697af9129486e056f79d09618af911b62278e4a9cc7083daf90

  • SHA512

    00410d6bc5043591644414b9b3a8ea83e6063e84a0bd9aa9da46d560a289c1a2bed2bde147f99b580dd6329eb180fc3d69796f432b68c1dc6d9c0f898d3e5b3b

  • SSDEEP

    12288:QAWa+Mv+9MnaG/DlmlGLEHWUlaWuDVfrU/kpkqvdxovK+m:iY+OnhJmscWiavVrgkpkqvdxoid

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7810622048:AAGlXVtU9EeAX6sumC63y05EJISEAmugavs/sendMessage?chat_id=986310232

Targets

    • Target

      MTNP240444042266.exe

    • Size

      587KB

    • MD5

      9f9e89382132182cde0649f42b2b3d48

    • SHA1

      31f54a2f7211f87081ce0ace0ba877c44ec07498

    • SHA256

      f68aec391b587697af9129486e056f79d09618af911b62278e4a9cc7083daf90

    • SHA512

      00410d6bc5043591644414b9b3a8ea83e6063e84a0bd9aa9da46d560a289c1a2bed2bde147f99b580dd6329eb180fc3d69796f432b68c1dc6d9c0f898d3e5b3b

    • SSDEEP

      12288:QAWa+Mv+9MnaG/DlmlGLEHWUlaWuDVfrU/kpkqvdxovK+m:iY+OnhJmscWiavVrgkpkqvdxoid

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks