General

  • Target

    zamówienia 31012025DJ ZK 25010325_pdf .scr.exe

  • Size

    30KB

  • Sample

    250131-j15csazpaw

  • MD5

    08bb8be80a2856a077319f59990154a9

  • SHA1

    373db0eedecdd0bb8e3e2457f4390e3a363e1ad6

  • SHA256

    61abb5aa05411cf92a1d762864cc824d594ffdd2dad4c2ca7f1c2f0c30e2a786

  • SHA512

    b11f003396781bc595c3a7eed18fd3322d23b0bdfc97450d8990060c6f49877d9e7b2e17beaa21a3bf4229d037043985a68962f79192b76ae41f5305b06bf37b

  • SSDEEP

    768:F8tDJhV6NTXJabo47/5xxwHBfKuL7BykI8:F8tDJhVKjJabog5/SXBykb

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot8018149517:AAGK_JH2rbFUhupxezqUln9lvYu9km5btWY/sendMessage?chat_id=7250529719

Targets

    • Target

      zamówienia 31012025DJ ZK 25010325_pdf .scr.exe

    • Size

      30KB

    • MD5

      08bb8be80a2856a077319f59990154a9

    • SHA1

      373db0eedecdd0bb8e3e2457f4390e3a363e1ad6

    • SHA256

      61abb5aa05411cf92a1d762864cc824d594ffdd2dad4c2ca7f1c2f0c30e2a786

    • SHA512

      b11f003396781bc595c3a7eed18fd3322d23b0bdfc97450d8990060c6f49877d9e7b2e17beaa21a3bf4229d037043985a68962f79192b76ae41f5305b06bf37b

    • SSDEEP

      768:F8tDJhV6NTXJabo47/5xxwHBfKuL7BykI8:F8tDJhVKjJabog5/SXBykb

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks