General

  • Target

    7b0e695718975e5743a2b0db5e119826d1715d1d274c3859276bd390c0e3602a

  • Size

    577KB

  • Sample

    250206-hv57fsyqgj

  • MD5

    3eee88f6d999d1d5c17d71091c6a0c76

  • SHA1

    b6d06543df0761d9b52ce343e6ac6358d8b1f582

  • SHA256

    7b0e695718975e5743a2b0db5e119826d1715d1d274c3859276bd390c0e3602a

  • SHA512

    ae6a124e1a48331c749436c4f2186d1a1b53d19d4b0cca982ef8e66b73bfb2bcd62d5869ea162487b2bd5821813b7f28244bca5e9ee21ee2c07e0ee0003b1694

  • SSDEEP

    12288:q78HVJlnLLF4crK3yxleaoAgjgajrX4+qyfPG1TE4IMs9f:wcVPKclxdWpjbcq0TE4sd

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7471415635:AAEA2wRbrQkd9OwoRD_hL1tDceuiErS34CY/sendMessage?chat_id=1613755033

Targets

    • Target

      Supply Tender documents (5 Years Agreement for Supply)_PDF_.exe

    • Size

      683KB

    • MD5

      adb3f7a91a7aef13a01c2675459495fa

    • SHA1

      bfa5e2582adf7077fdb5f1536ab29e4a419f8c0f

    • SHA256

      72e253234552253ae4a75775c1c42c4d799e96a4b1b369f52519654a7d8458f7

    • SHA512

      4ceb65eb0081012f9124f8c33f51b15001d3aba25152af34b427a9f59e7e4ded7a07f1ba5d2d08fd1aaeea8c31188f6cd9d3e6833987ddfa10bce2d778ccc0e9

    • SSDEEP

      12288:m4JF8B6slRIp4QFMcrKTyxleaohl6dEVOAx6il4aHyzK8fUkJiL:m4NsRG4pcTxd2l6C4BI4aSz3Ji

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks