General

  • Target

    64157d14bc770c59f8cfffa73f7dec64d2b2a1568329712681633388cf682823.r00

  • Size

    633KB

  • Sample

    250221-dpn9jatlx2

  • MD5

    16064f256cae97624c06245b53ffefb8

  • SHA1

    eb82d4b36c13f98aff67ea626a286f2821cde63a

  • SHA256

    64157d14bc770c59f8cfffa73f7dec64d2b2a1568329712681633388cf682823

  • SHA512

    4d5dfd7f77b9b67b191f967f79c6c00f2d5b2421cc7347b220b18574ccaddbf50bdb634c3bd368be826886c04a5bcfd1fbc2613b7fd700a00d1138833ef95fa7

  • SSDEEP

    12288:YJN8lG7s8RmXpXuqbSmj5iNCsOg5uaptjLst/QCvNEzg9GkiMQQY3jCG0cC:LQ7sZu4oNCy/p0NEM9LQQsjCGnC

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7791603510:AAFQYjUt2v3SAld_qBIl7vQWHq4eSD9hepU/sendMessage?chat_id=6306771742

Targets

    • Target

      lgh5walrVUMJyT7.exe

    • Size

      802KB

    • MD5

      420361f15c6b5f83e2116a38dfc30be2

    • SHA1

      667f02f4d72f15699a3438a48fe1a04b6d739332

    • SHA256

      ca24c73a0f1820042d015e2d96c97c08a37cda6cda766e609f9e33970f269fee

    • SHA512

      fe7159d8e78def63fd2dfc769277fd85ed6b65d21e2aada052304630af3a9746d007c924b03ce370e016b77ac61c465861b9e598acc5f08cb5f9dfd592f64b97

    • SSDEEP

      12288:5OBUrzYDpGDWN74lZK6Jp61c9ZUBYJxnPN9/vs8:XXMpGy7GZK6JRZUGJhF9/

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks