General

  • Target

    a71527b4ac58f6f9c2f7649b0be7c7b6ddb327f35ad6520dc1013f4b52ef6d3f

  • Size

    650KB

  • Sample

    250219-jxja5s1nf1

  • MD5

    ec1cd3300196f9ce14fb36fe13be1652

  • SHA1

    1410f1e8937de6997bde2f2332b61a54ff29e613

  • SHA256

    a71527b4ac58f6f9c2f7649b0be7c7b6ddb327f35ad6520dc1013f4b52ef6d3f

  • SHA512

    f02c8e1242af20ef26ccae5a200cc4cfe65c73541584dc1039f0431eb60e675be647ffe656bbe823805778e8170852fd586ca3b227caee6903eb9dd1dc613d2c

  • SSDEEP

    12288:gIlFyc5Ux91XdaAunyENLGwu2wFpZstcv/ZZs3IUdVTLbe8DvwYTOZIlHed:gIGuUx90nymu+cv/Ls3IUdVT3JDYY6ou

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7572469755:AAHCBLe3bEv-r8VSlR3NztVSSHz6JBpCC7s/sendMessage?chat_id=7207594974

Targets

    • Target

      Purchase Order.exe

    • Size

      772KB

    • MD5

      92a40a60631e0cc736c95f08cee7e729

    • SHA1

      270115ba8254e2875239d1919fc0048c551d6731

    • SHA256

      5a2a58a5c9a50cda175b03b68636c5f68d7dcc73eb19311ceb2940dddc97654e

    • SHA512

      779e8d1734d0fc532ca763da96c04fc1f96b70a2c2c1a673ac59076fa30f7fe46b07a047d4bb485ffffd50bf533d1513f246b1c21c0ad3be9a4fe48ec5a76871

    • SSDEEP

      12288:pOyRb+fURnHb+Qv6HNbwVLvQNtNrGau2AFnZstWFgXqBAhUgd7LkgKFB02E73qr5:QyMMRHPv6tkVzQTuyWFTdEZ4kMRH

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks