General

  • Target

    kduYCOzG3unrjuS.exe

  • Size

    971KB

  • Sample

    250214-j5m93aypav

  • MD5

    d3a0ba21324645f871848f12087c22f8

  • SHA1

    465af54531dbf6f506429c64ab89bebb217ca63e

  • SHA256

    f74aa66c0a64b0bc95576d70551981e1d0e65de9662885cb4dde19e81bce76e2

  • SHA512

    0e0c09f95b7bce088bbc0ccba42462c7812dad9a9becc92f4bba96e2d291c2fde4a99ee5bdda1ab56487439a1240da8ecd02db25f8a086730050d866deee3bc9

  • SSDEEP

    24576:LQaHUIAwQ3L+TziY36qAMBiFbwH4yyzim0CY8iMo6bt:kaHUIAwS9GCuH4yyg8iMJ

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot8146065464:AAFmO8RMLpJgd1BLjqm9MO8V-EzP0a6-JD4/sendMessage?chat_id=6306771742

Targets

    • Target

      kduYCOzG3unrjuS.exe

    • Size

      971KB

    • MD5

      d3a0ba21324645f871848f12087c22f8

    • SHA1

      465af54531dbf6f506429c64ab89bebb217ca63e

    • SHA256

      f74aa66c0a64b0bc95576d70551981e1d0e65de9662885cb4dde19e81bce76e2

    • SHA512

      0e0c09f95b7bce088bbc0ccba42462c7812dad9a9becc92f4bba96e2d291c2fde4a99ee5bdda1ab56487439a1240da8ecd02db25f8a086730050d866deee3bc9

    • SSDEEP

      24576:LQaHUIAwQ3L+TziY36qAMBiFbwH4yyzim0CY8iMo6bt:kaHUIAwS9GCuH4yyg8iMJ

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Downloads MZ/PE file

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks