General

  • Target

    Narudžbenica 130666 Impol Tlm_pdf .scr

  • Size

    12KB

  • Sample

    250411-hl8afssls5

  • MD5

    8b858788092ce0a0a4c774712bf99089

  • SHA1

    d0363773fdbfa6718325af55dac0a91f0ff01a0d

  • SHA256

    511c7c20def507f2498d9bb941173990602dcbe9b45399d424c232fca3aa318e

  • SHA512

    693876604cfaf457ee3e81a507b35e8a7dbab469754140b17a2a2b68b28c5e71dc02ef3b17044d4e5a17bc2eea922c8201133ced0afc9abaa235640275d8169d

  • SSDEEP

    384:9X+ZBkUfh6g3CnMb4RHaPSqsDhVLEJ89M5niUug:96kUYG4RHcSXDhVLEJ1i2

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7016021549:AAFFED6mrzzYMktPd78AMWdi_nAN7SC1JJY/sendMessage?chat_id=1018401531

Targets

    • Target

      Narudžbenica 130666 Impol Tlm_pdf .scr

    • Size

      12KB

    • MD5

      8b858788092ce0a0a4c774712bf99089

    • SHA1

      d0363773fdbfa6718325af55dac0a91f0ff01a0d

    • SHA256

      511c7c20def507f2498d9bb941173990602dcbe9b45399d424c232fca3aa318e

    • SHA512

      693876604cfaf457ee3e81a507b35e8a7dbab469754140b17a2a2b68b28c5e71dc02ef3b17044d4e5a17bc2eea922c8201133ced0afc9abaa235640275d8169d

    • SSDEEP

      384:9X+ZBkUfh6g3CnMb4RHaPSqsDhVLEJ89M5niUug:96kUYG4RHcSXDhVLEJ1i2

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v16

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.