General

  • Target

    0a80f14cc474ad3017d2a2138a89e7d667638421b0cd3340591de19a5a8b418f

  • Size

    778KB

  • Sample

    250218-efdl4sxjcz

  • MD5

    d6b76929d75bc75165f636ef8d5c6beb

  • SHA1

    73df03346fbd110ccea8558a4d4d8ecdf8901114

  • SHA256

    0a80f14cc474ad3017d2a2138a89e7d667638421b0cd3340591de19a5a8b418f

  • SHA512

    97f8e7d4e78a7e0b2c8c061d5be4bfac41a724c2ab09d03aaf0e7a6d2a35fda0f00bb81ead34481f520b63d679ff6c1f10ec7de2d6315a6969849d11b8f2fd62

  • SSDEEP

    12288:skilH07BWB9go+Mxm+1kz0uOkY2IeCph+EWm6kSJ9Fk7rrYYHrFG:skiIBU9gGmiJkNEjRSJfk7rrYYRG

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7572469755:AAHCBLe3bEv-r8VSlR3NztVSSHz6JBpCC7s/sendMessage?chat_id=7207594974

Targets

    • Target

      PURCHASE ORDER (2).exe

    • Size

      881KB

    • MD5

      20a391888281aae1523bcf182c1cb4e9

    • SHA1

      587eea4c6fc96e91f316c60f31710071764440fa

    • SHA256

      16ac39458488454a5d43d2f0d250fe014bf22ab1542ee6cbd10c6f69ab8d91d8

    • SHA512

      98d5604761ee0a227d294837aa3c0d13145387f12bb3796aeaf8abc4d126c0ed24f3d75e3b1e6f04f15c072ca46bffdbc3ae57bb2e00b74567f390ee9077e157

    • SSDEEP

      12288:rq15gMrgh3LbQb42hkSJsrg/S2rO8egXsyFIxN4Kuw+3L6tXju:rqLfgeE2KSJUQYIs4IN453LM

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks