General

  • Target

    9e0115bc5a747ada6e08054f6db9c93b3c461afde90377b69857461fddf56f34

  • Size

    663KB

  • Sample

    250220-egynnsxpw5

  • MD5

    41097f32b0d23845bcf062247228c3d1

  • SHA1

    30910ca60b1cb1a8e978ceaba52f246b615b3691

  • SHA256

    9e0115bc5a747ada6e08054f6db9c93b3c461afde90377b69857461fddf56f34

  • SHA512

    1e624f010a5220af17d1608a23acf89bc7aedb57a24dc6fb2a204ca1dd00f1c3dc30f29443c49f99532f5b08ec850aa6f9582ddca329dfb5dbc2bb6c81bd28fd

  • SSDEEP

    12288:rX3Y58V5YsITuX/iXD78oIvpiHq9D1epzNeAvX4QXdXnLNzVIeCZK:rXlV5YsciQf6piHqfkYiX4QNXnZzHCZK

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7572469755:AAHCBLe3bEv-r8VSlR3NztVSSHz6JBpCC7s/sendMessage?chat_id=7207594974

Targets

    • Target

      updated price list.exe

    • Size

      908KB

    • MD5

      ca056a3aebdf8862e08c794f6f0a6f61

    • SHA1

      94163a06efc4784bbb04f1fdcf6b0321de3aff0a

    • SHA256

      1952bd4cf85d07d155fee0fd9f75b5c5e52af32c20994eb3b248fbd03ffe9fcf

    • SHA512

      f244400bc7aff7a6b9a650abc2f0e1d5d9f8232479447cfedd788c6f6605c78a5406241f90e72ac309a65c0944e61a8cd3d00741aab9b8651f5cb1afd814565a

    • SSDEEP

      12288:frT5UqCUfsgddZWQbQRqdPCYjkYUaqhqpDoIDpZLFUOvGUTSsFmeCiK2+9Hrs:f2ZwhtxTphtBSsFmnizO

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks