General

  • Target

    e2ce18dc2989ae7bf96190b29e375637f530e55e4e20705bf5ee2b4677813aaa

  • Size

    526KB

  • Sample

    250214-tabb5atjey

  • MD5

    6b709debce80248c965c9673c216ef55

  • SHA1

    82a9d9f97455a564c3a81f51a0f49f5a43c6159e

  • SHA256

    e2ce18dc2989ae7bf96190b29e375637f530e55e4e20705bf5ee2b4677813aaa

  • SHA512

    1bae3fb591a6e38e96df1edf79489bbc8b406acd2610e6ae176914255b5a11324bb52ab1d704e800c7433c0e01589d17704f9f4ef5cace302b1cdb94617a2fd7

  • SSDEEP

    12288:H2GIxsEW62PBlMkQqX/AKU4zvRfaF+mevMuH1dA720IPoU0:H2GIxo6krvjUmRfaF+mevM8bATIAh

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7920003586:AAHBMriHaNCFiZ4OQ4NdecriTbdf93HSOJo/sendMessage?chat_id=7174574119

Targets

    • Target

      Nuevo pedido N. Z21239.exe

    • Size

      943KB

    • MD5

      b0f8780c47cb2f1dbfff0746f71124a7

    • SHA1

      d891f8246efb54f7020b39c0787f1fc656326ac7

    • SHA256

      a033bd54a83b5d3e5734514f69120d9ef835533ae0a64aea48d98f3bccb42be4

    • SHA512

      b0ff180cc232f86c55085adf7553b9d5777326dcaf54e766b2efd060886be05457f0d282019fe6168674c33c55189f221f7753f9f7e2b7f12ce3fbf73a8327ca

    • SSDEEP

      24576:Ou6J33O0c+JY5UZ+XC0kGso6FatAAbS51WY:Au0c++OCvkGs9FatcuY

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Downloads MZ/PE file

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks