General

  • Target

    dcb42b8ad4e7cc40fe12cfef0f5b97fba6073716a6315784ed6dd8847a51e86d.exe

  • Size

    909KB

  • Sample

    250220-etzfqswncz

  • MD5

    48303a0f6cf86a64328acc545192bff0

  • SHA1

    2c9973e30e9697c5c8b6a91ecb3fbc8b05c3b455

  • SHA256

    dcb42b8ad4e7cc40fe12cfef0f5b97fba6073716a6315784ed6dd8847a51e86d

  • SHA512

    f54afc180d0d1bf6ce4ddaa8ea04a1c2281390a8bc102b2b5e52d6bed2083932af1e0862a7d498695cde64a939d5704d2e48766c4b72fab76c8321cd8ac36891

  • SSDEEP

    12288:m3ks0DMw9q5M3FYOc+s7LbcwH8YiSFDw5:m3ksxw9rYO6Pcwcaw

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7572469755:AAHCBLe3bEv-r8VSlR3NztVSSHz6JBpCC7s/sendMessage?chat_id=7207594974

Targets

    • Target

      dcb42b8ad4e7cc40fe12cfef0f5b97fba6073716a6315784ed6dd8847a51e86d.exe

    • Size

      909KB

    • MD5

      48303a0f6cf86a64328acc545192bff0

    • SHA1

      2c9973e30e9697c5c8b6a91ecb3fbc8b05c3b455

    • SHA256

      dcb42b8ad4e7cc40fe12cfef0f5b97fba6073716a6315784ed6dd8847a51e86d

    • SHA512

      f54afc180d0d1bf6ce4ddaa8ea04a1c2281390a8bc102b2b5e52d6bed2083932af1e0862a7d498695cde64a939d5704d2e48766c4b72fab76c8321cd8ac36891

    • SSDEEP

      12288:m3ks0DMw9q5M3FYOc+s7LbcwH8YiSFDw5:m3ksxw9rYO6Pcwcaw

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks