General

  • Target

    REQ.NO.237.exe

  • Size

    772KB

  • Sample

    250219-h1xghazqbs

  • MD5

    92a40a60631e0cc736c95f08cee7e729

  • SHA1

    270115ba8254e2875239d1919fc0048c551d6731

  • SHA256

    5a2a58a5c9a50cda175b03b68636c5f68d7dcc73eb19311ceb2940dddc97654e

  • SHA512

    779e8d1734d0fc532ca763da96c04fc1f96b70a2c2c1a673ac59076fa30f7fe46b07a047d4bb485ffffd50bf533d1513f246b1c21c0ad3be9a4fe48ec5a76871

  • SSDEEP

    12288:pOyRb+fURnHb+Qv6HNbwVLvQNtNrGau2AFnZstWFgXqBAhUgd7LkgKFB02E73qr5:QyMMRHPv6tkVzQTuyWFTdEZ4kMRH

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7572469755:AAHCBLe3bEv-r8VSlR3NztVSSHz6JBpCC7s/sendMessage?chat_id=7207594974

Targets

    • Target

      REQ.NO.237.exe

    • Size

      772KB

    • MD5

      92a40a60631e0cc736c95f08cee7e729

    • SHA1

      270115ba8254e2875239d1919fc0048c551d6731

    • SHA256

      5a2a58a5c9a50cda175b03b68636c5f68d7dcc73eb19311ceb2940dddc97654e

    • SHA512

      779e8d1734d0fc532ca763da96c04fc1f96b70a2c2c1a673ac59076fa30f7fe46b07a047d4bb485ffffd50bf533d1513f246b1c21c0ad3be9a4fe48ec5a76871

    • SSDEEP

      12288:pOyRb+fURnHb+Qv6HNbwVLvQNtNrGau2AFnZstWFgXqBAhUgd7LkgKFB02E73qr5:QyMMRHPv6tkVzQTuyWFTdEZ4kMRH

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks