General

  • Target

    fe7421156cc8170d04f7d03d2cd90ffc7fc544247502ea38f52b5437f9a99949.exe

  • Size

    960KB

  • Sample

    250219-gxprtayrcx

  • MD5

    2852113f5b55c647892bcd338f1f83d9

  • SHA1

    cc1d9cb3859fa41935b4e50bc3fe3ef28166d981

  • SHA256

    fe7421156cc8170d04f7d03d2cd90ffc7fc544247502ea38f52b5437f9a99949

  • SHA512

    fec40e41a531efee64bd9af9efd6080a21c5a33d49fc5789709e1038c5a11f9f41045386c9f89310ba4d0c4eb98038be323a815011e65325b3a37e990c21226e

  • SSDEEP

    24576:Wu6J33O0c+JY5UZ+XC0kGso6FaPrJ3ayXWY:4u0c++OCvkGs9FaPwVY

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7933970075:AAH-phqF2Nqha9N-SqH71iAqVTOYva6GRpE/sendMessage?chat_id=6557702940

Targets

    • Target

      fe7421156cc8170d04f7d03d2cd90ffc7fc544247502ea38f52b5437f9a99949.exe

    • Size

      960KB

    • MD5

      2852113f5b55c647892bcd338f1f83d9

    • SHA1

      cc1d9cb3859fa41935b4e50bc3fe3ef28166d981

    • SHA256

      fe7421156cc8170d04f7d03d2cd90ffc7fc544247502ea38f52b5437f9a99949

    • SHA512

      fec40e41a531efee64bd9af9efd6080a21c5a33d49fc5789709e1038c5a11f9f41045386c9f89310ba4d0c4eb98038be323a815011e65325b3a37e990c21226e

    • SSDEEP

      24576:Wu6J33O0c+JY5UZ+XC0kGso6FaPrJ3ayXWY:4u0c++OCvkGs9FaPwVY

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks