General

  • Target

    z1040224NOVATECHMX87546769.exe

  • Size

    971KB

  • Sample

    250205-vh45vavrbx

  • MD5

    f8f78b7363ad4f8613f5e4d8c1c0c126

  • SHA1

    ae26fdc3f2918ecf28d19f6ee6472990a2966638

  • SHA256

    03e78360c525a0b380006cb25a747352f9627da6c5afb25ff4d382473c597dd2

  • SHA512

    8ddee9904dde8875499d59d1b0de5366ef74aaa0224783f75ca50dcde72c75b8baea7397cd6d4f03eb85f41d6b9f30d80b435613f1e00b3b429e9c20639190b0

  • SSDEEP

    24576:HAHnh+eWsN3skA4RV1Hom2KXFmIaWiFp9QIayD5V5:6h+ZkldoPK1XaWiFTxt

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7920003586:AAHBMriHaNCFiZ4OQ4NdecriTbdf93HSOJo/sendMessage?chat_id=7174574119

Targets

    • Target

      z1040224NOVATECHMX87546769.exe

    • Size

      971KB

    • MD5

      f8f78b7363ad4f8613f5e4d8c1c0c126

    • SHA1

      ae26fdc3f2918ecf28d19f6ee6472990a2966638

    • SHA256

      03e78360c525a0b380006cb25a747352f9627da6c5afb25ff4d382473c597dd2

    • SHA512

      8ddee9904dde8875499d59d1b0de5366ef74aaa0224783f75ca50dcde72c75b8baea7397cd6d4f03eb85f41d6b9f30d80b435613f1e00b3b429e9c20639190b0

    • SSDEEP

      24576:HAHnh+eWsN3skA4RV1Hom2KXFmIaWiFp9QIayD5V5:6h+ZkldoPK1XaWiFTxt

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks