General

  • Target

    CMS AGE Invoice 8 March 2025 sign.exe

  • Size

    1.0MB

  • Sample

    250414-hcexjssvas

  • MD5

    70b411c7aa1753649f16bf40ff715e15

  • SHA1

    25164d02b05a3d22a63e47ab09fd8f5c96650a8c

  • SHA256

    4723dee89c57a6cd8008358779826bfb0a6385f40dd852ad1bbba3e5e6d6758c

  • SHA512

    722116926312bb80a85eda1af64876dff2802f4d29e3a2d5b1f7366076c8d0d8137cb4bdb29282b95a731a3b160ba0fec3ecc701cd802e3758c592b253086851

  • SSDEEP

    24576:QG8tBFBiemT0AxlhvMh85j+nJuhUwY+s6iA4GuaJjt8c:TeHixKyjIJuJ26Idc

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7694680589:AAH7v3RVHta216sxEJEjKVfvPtJtbLd9qY0/sendMessage?chat_id=7987531671

Targets

    • Target

      CMS AGE Invoice 8 March 2025 sign.exe

    • Size

      1.0MB

    • MD5

      70b411c7aa1753649f16bf40ff715e15

    • SHA1

      25164d02b05a3d22a63e47ab09fd8f5c96650a8c

    • SHA256

      4723dee89c57a6cd8008358779826bfb0a6385f40dd852ad1bbba3e5e6d6758c

    • SHA512

      722116926312bb80a85eda1af64876dff2802f4d29e3a2d5b1f7366076c8d0d8137cb4bdb29282b95a731a3b160ba0fec3ecc701cd802e3758c592b253086851

    • SSDEEP

      24576:QG8tBFBiemT0AxlhvMh85j+nJuhUwY+s6iA4GuaJjt8c:TeHixKyjIJuJ26Idc

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Accesses Microsoft Outlook profiles

    • Blocklisted process makes network request

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v16

Tasks