General

  • Target

    f3c498fb56e03eb5d37b1bacf4c360cf880a7b25f5b338d1fc2efb2336f3255b

  • Size

    956KB

  • Sample

    250220-ls7jaasleq

  • MD5

    646d6a8071101735cda455a8fa55b43f

  • SHA1

    6bff90bad9c6e5c61b07fa19de0e40f6df0d9c85

  • SHA256

    f3c498fb56e03eb5d37b1bacf4c360cf880a7b25f5b338d1fc2efb2336f3255b

  • SHA512

    3a4582685d5c4e715046f77dbeaa13b7c5998a8a891d8db27618869d0e694008e07b481d77c2cda9238257358b2c1dedae8e4273f96da9fea81627ce637a0bd1

  • SSDEEP

    24576:Nu6J33O0c+JY5UZ+XC0kGso6FaHIj28u8WY:/u0c++OCvkGs9FaHI68EY

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7335410877:AAHBMeSn7K8p-NY6dklN-m5n2viykY0OFhs/sendMessage?chat_id=7747524028

Targets

    • Target

      f3c498fb56e03eb5d37b1bacf4c360cf880a7b25f5b338d1fc2efb2336f3255b

    • Size

      956KB

    • MD5

      646d6a8071101735cda455a8fa55b43f

    • SHA1

      6bff90bad9c6e5c61b07fa19de0e40f6df0d9c85

    • SHA256

      f3c498fb56e03eb5d37b1bacf4c360cf880a7b25f5b338d1fc2efb2336f3255b

    • SHA512

      3a4582685d5c4e715046f77dbeaa13b7c5998a8a891d8db27618869d0e694008e07b481d77c2cda9238257358b2c1dedae8e4273f96da9fea81627ce637a0bd1

    • SSDEEP

      24576:Nu6J33O0c+JY5UZ+XC0kGso6FaHIj28u8WY:/u0c++OCvkGs9FaHI68EY

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks