General

  • Target

    ORDER0869786.exe

  • Size

    1.1MB

  • Sample

    250206-j3c2bayndw

  • MD5

    91cf2ce8fca2f3656fb2518fba04710e

  • SHA1

    eee8109d8520e5589308e9901d762d903906d5b3

  • SHA256

    2f1d9da7f9382f2a8e97474d0ee540abede94da80051b831e6b926126ea9ce40

  • SHA512

    d254d1ff59211f42a6d6607ce9acd626dcc220f8e5c314ff2420c29f190cb25c44ba29e9474e7cc07ba77272a4ec8900947f0fcdf84f4f51f7f251d14173ad56

  • SSDEEP

    24576:zAHnh+eWsN3skA4RV1Hom2KXFmIaOd+4CvsrdVtA5:+h+ZkldoPK1XaOd+xvsvA

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot8152393919:AAFcv9D2OhgJkwW5R_jm9t4Pm6asb_5vQdk/sendMessage?chat_id=1437092720

Targets

    • Target

      ORDER0869786.exe

    • Size

      1.1MB

    • MD5

      91cf2ce8fca2f3656fb2518fba04710e

    • SHA1

      eee8109d8520e5589308e9901d762d903906d5b3

    • SHA256

      2f1d9da7f9382f2a8e97474d0ee540abede94da80051b831e6b926126ea9ce40

    • SHA512

      d254d1ff59211f42a6d6607ce9acd626dcc220f8e5c314ff2420c29f190cb25c44ba29e9474e7cc07ba77272a4ec8900947f0fcdf84f4f51f7f251d14173ad56

    • SSDEEP

      24576:zAHnh+eWsN3skA4RV1Hom2KXFmIaOd+4CvsrdVtA5:+h+ZkldoPK1XaOd+xvsvA

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks