General

  • Target

    27032025_1624_27032025_Inspection sample.r00

  • Size

    524KB

  • Sample

    250327-twr7rsxjx4

  • MD5

    035b00700c7c2463f2bb4bd8d01b19f7

  • SHA1

    32973f3cbf8759fdf8d704ddf126da9e88f4e932

  • SHA256

    15d126878e7c07d9781f95c92add5c8927292f04bdc19cc1e54e75c78ad6ddda

  • SHA512

    115298722cee211944199924978fce4b4a7f2e7696daa935e8db4180ae080cd3635f018039294f22562b4f1657e51aaacb88800dd15bb61ba149bdd538981303

  • SSDEEP

    6144:ranIJeIYMFu52V2B3r7ArcYKZAH0ybtA1kBjSuAGGHTXTnu30MKeoMFjUtk3/UPp:i7IuB3rsHHskBFAW0MKeoM+tkv+PS34z

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7771414253:AAEI6ViUbLcxoGeVLOmbEoP7NXWSkDDW9Fo/sendMessage?chat_id=1695799026

Targets

    • Target

      Inspection sample.exe

    • Size

      641KB

    • MD5

      a672b8f0cd4cc6aebfdb889074e39822

    • SHA1

      3a167c22503866b00270de06448ae2eb60a4a857

    • SHA256

      08a20e7023a3e5c544e0d48c67d6a50cf22aedc680b85237fa91b9fa315275cd

    • SHA512

      3cf5e2268917ef65964e3303a37ed296f2fc20ed897fb947e9717690a7b6dd3361b2069691f8252b320b21ef56c64149971313f93f858662a4577fa4ef874039

    • SSDEEP

      12288:zAd9fTeWCB3SGK64Cpd8SIEu+ysWLyA+gW:Md9fXNrOP8yuwWLyA

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks