General

  • Target

    9a0eddd3252af7bf52dfdace863a0bedbdaf434a87b365d06c5d3ad6c1533ee1

  • Size

    502KB

  • Sample

    250122-kn98yaylgn

  • MD5

    d8438f3c083d3d74ceebc95032d000f2

  • SHA1

    a92162740d68ac94231ed8e32398e4af7b1f0bc0

  • SHA256

    9a0eddd3252af7bf52dfdace863a0bedbdaf434a87b365d06c5d3ad6c1533ee1

  • SHA512

    e4c607681a2dbb0d8e8d3bbcfe48c653130602d32543674a2f93ca968b75b8228376fb4e66cd7a2df999a0e73cc61f70f5720c3cc96840b355768e0ee0ed6e0e

  • SSDEEP

    12288:ueyzUieSa2BPOjrMnPEaYGAJ/bs9T5vqPD4dC0wa/he:ueyja22eMaYGAJ49T5qPME0wa/g

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7810622048:AAGlXVtU9EeAX6sumC63y05EJISEAmugavs/sendMessage?chat_id=986310232

Targets

    • Target

      Purchase Order 24398.exe

    • Size

      587KB

    • MD5

      9f9e89382132182cde0649f42b2b3d48

    • SHA1

      31f54a2f7211f87081ce0ace0ba877c44ec07498

    • SHA256

      f68aec391b587697af9129486e056f79d09618af911b62278e4a9cc7083daf90

    • SHA512

      00410d6bc5043591644414b9b3a8ea83e6063e84a0bd9aa9da46d560a289c1a2bed2bde147f99b580dd6329eb180fc3d69796f432b68c1dc6d9c0f898d3e5b3b

    • SSDEEP

      12288:QAWa+Mv+9MnaG/DlmlGLEHWUlaWuDVfrU/kpkqvdxovK+m:iY+OnhJmscWiavVrgkpkqvdxoid

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks