General

  • Target

    02022025_1558_31012025_zamówienia 31012025DJ ZK 25010325_pdf .img

  • Size

    90KB

  • Sample

    250202-tes3qsymct

  • MD5

    b492fbad6fcf1a52a6885ecd90f82fad

  • SHA1

    090823f6ecc336016f73be97453e799aad0fec2d

  • SHA256

    2e06804809b8ab5372347740576ab0d8db7212d487118470f30aec3d1845ff74

  • SHA512

    dbb1f3be92f9f66a7201e9bc7636023ca1ef05b28b8a5a093efa791722ad622da722dd1813cf87dbe89118fc762a37eafddc8d2c103dc8cd1b463fc6d227cf65

  • SSDEEP

    768:Nhj8tDJhV6NTXJabo47/5xxwHBfKuL7BykI8:Nx8tDJhVKjJabog5/SXBykb

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot8018149517:AAGK_JH2rbFUhupxezqUln9lvYu9km5btWY/sendMessage?chat_id=7250529719

Targets

    • Target

      zamówienia 31012025DJ ZK 25010325_pdf .scr

    • Size

      30KB

    • MD5

      08bb8be80a2856a077319f59990154a9

    • SHA1

      373db0eedecdd0bb8e3e2457f4390e3a363e1ad6

    • SHA256

      61abb5aa05411cf92a1d762864cc824d594ffdd2dad4c2ca7f1c2f0c30e2a786

    • SHA512

      b11f003396781bc595c3a7eed18fd3322d23b0bdfc97450d8990060c6f49877d9e7b2e17beaa21a3bf4229d037043985a68962f79192b76ae41f5305b06bf37b

    • SSDEEP

      768:F8tDJhV6NTXJabo47/5xxwHBfKuL7BykI8:F8tDJhVKjJabog5/SXBykb

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks