General

  • Target

    9f0621c4cf15fa307280544219cc5ec4a18385aabb987e4ae24fb3d242f4636c.exe

  • Size

    952KB

  • Sample

    250219-fphsvsxphr

  • MD5

    15e2ffa4a2f8b42d5c133d26fac916d2

  • SHA1

    daab3c2bc5e78e8b09223129f267a302565063a1

  • SHA256

    9f0621c4cf15fa307280544219cc5ec4a18385aabb987e4ae24fb3d242f4636c

  • SHA512

    aa9acef205ae1b9191ea99144b13de280c3a951f99850a82f5a7034e4fc6ee93cd3f2e6f56a7d395dc546c71fddfe5104c3e379b96aa4de1050042a7b5b4b585

  • SSDEEP

    24576:vu6J33O0c+JY5UZ+XC0kGso6FaPPKe8QWY:Zu0c++OCvkGs9FaPyY

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot8123813718:AAE7xhJKgiVtPaoPZCfcx9AxRJoEs0MjRtc/sendMessage?chat_id=7607163233

Targets

    • Target

      9f0621c4cf15fa307280544219cc5ec4a18385aabb987e4ae24fb3d242f4636c.exe

    • Size

      952KB

    • MD5

      15e2ffa4a2f8b42d5c133d26fac916d2

    • SHA1

      daab3c2bc5e78e8b09223129f267a302565063a1

    • SHA256

      9f0621c4cf15fa307280544219cc5ec4a18385aabb987e4ae24fb3d242f4636c

    • SHA512

      aa9acef205ae1b9191ea99144b13de280c3a951f99850a82f5a7034e4fc6ee93cd3f2e6f56a7d395dc546c71fddfe5104c3e379b96aa4de1050042a7b5b4b585

    • SSDEEP

      24576:vu6J33O0c+JY5UZ+XC0kGso6FaPPKe8QWY:Zu0c++OCvkGs9FaPyY

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks