General

  • Target

    CV Francisca Esmeralda.exe

  • Size

    944KB

  • Sample

    250128-nnvp2azpej

  • MD5

    fcd5c0b5572e5ba431a5f6b2dabe5503

  • SHA1

    2a5297ed0f5724106d8a3b0606ff9cf4dc6c0e16

  • SHA256

    48ad85fc3ab4ab11d497f78cb86f871c9aa8ce62e17166df2a806fcf7b9c291d

  • SHA512

    b2c19437a2c398f2af2cf503a341a18b19b16143ad4f8a6d8d08629e3e07e0eb86e0ac1048ff0cbc8f3ce445298354d5548a3dff9d34cf72ccf5562122d3208f

  • SSDEEP

    24576:uRmJkcoQricOIQxiZY1iaC5c0KAdiSC+Da:7JZoQrbTFZY1iaCa0tdiwDa

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7920003586:AAHBMriHaNCFiZ4OQ4NdecriTbdf93HSOJo/sendMessage?chat_id=7174574119

Targets

    • Target

      CV Francisca Esmeralda.exe

    • Size

      944KB

    • MD5

      fcd5c0b5572e5ba431a5f6b2dabe5503

    • SHA1

      2a5297ed0f5724106d8a3b0606ff9cf4dc6c0e16

    • SHA256

      48ad85fc3ab4ab11d497f78cb86f871c9aa8ce62e17166df2a806fcf7b9c291d

    • SHA512

      b2c19437a2c398f2af2cf503a341a18b19b16143ad4f8a6d8d08629e3e07e0eb86e0ac1048ff0cbc8f3ce445298354d5548a3dff9d34cf72ccf5562122d3208f

    • SSDEEP

      24576:uRmJkcoQricOIQxiZY1iaC5c0KAdiSC+Da:7JZoQrbTFZY1iaCa0tdiwDa

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks