General

  • Target

    z91NUEVALISTADEPEDIDOSVENOKLERINTPDF.exe

  • Size

    745KB

  • Sample

    250211-rb5w1strap

  • MD5

    6fda43cabb3f068d38bc6bc1de5990b4

  • SHA1

    d5e4f33e9957ac4bf91d757106708fb94f92d91d

  • SHA256

    d5fc860d01e3c7e3a46a4cbb98f8c654e7533f4ecfb25218c00f4bac9061f6c8

  • SHA512

    6a299357ce6d1d96661377c57b9279a5d31d26323c507f1a54a6a54cf57bd22fce3f91b5f7c6d6edb72999f6785b548f513f7460e8c99c672c01f85798fb7c26

  • SSDEEP

    12288:ehkDgouVA2nxKkorvdRgQriDwOIxmxiZnYQE7PJcE4aCbVpGVln4:uRmJkcoQricOIQxiZY1iaCbAln4

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7920003586:AAHBMriHaNCFiZ4OQ4NdecriTbdf93HSOJo/sendMessage?chat_id=7174574119

Targets

    • Target

      z91NUEVALISTADEPEDIDOSVENOKLERINTPDF.exe

    • Size

      745KB

    • MD5

      6fda43cabb3f068d38bc6bc1de5990b4

    • SHA1

      d5e4f33e9957ac4bf91d757106708fb94f92d91d

    • SHA256

      d5fc860d01e3c7e3a46a4cbb98f8c654e7533f4ecfb25218c00f4bac9061f6c8

    • SHA512

      6a299357ce6d1d96661377c57b9279a5d31d26323c507f1a54a6a54cf57bd22fce3f91b5f7c6d6edb72999f6785b548f513f7460e8c99c672c01f85798fb7c26

    • SSDEEP

      12288:ehkDgouVA2nxKkorvdRgQriDwOIxmxiZnYQE7PJcE4aCbVpGVln4:uRmJkcoQricOIQxiZY1iaCbAln4

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Downloads MZ/PE file

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks