General

  • Target

    5a92d770d34718ab6624c95d586269cb9d144803cb0f94ea91b78344360eb5cf.exe

  • Size

    1.4MB

  • Sample

    240705-bq5xka1epg

  • MD5

    1a3037dced4fbdc13c75a4a4a34183a5

  • SHA1

    7e1572f43015ae80ee15354bce184ac0f75e6e67

  • SHA256

    5a92d770d34718ab6624c95d586269cb9d144803cb0f94ea91b78344360eb5cf

  • SHA512

    5ba8603f9a2e8606620430198002fb7e91491db0bc5dfad354ccc70024c8fcfd631ba0e34af2615bb569e6946705811253be136b5b1f6970567b579f78912ab2

  • SSDEEP

    12288:a/ysGty1fTXeVCs9mLzGoPbAU6TNuUjFwCbxvVaMOo+961u:a/ysGtEfTuVDmPZbwTN1jPlvVaP5I1u

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7388475942:AAE6mkO0w6qR_NK1NnfOAG-t5uHzWLuoUXo/sendMessage?chat_id=5259132764

Targets

    • Target

      5a92d770d34718ab6624c95d586269cb9d144803cb0f94ea91b78344360eb5cf.exe

    • Size

      1.4MB

    • MD5

      1a3037dced4fbdc13c75a4a4a34183a5

    • SHA1

      7e1572f43015ae80ee15354bce184ac0f75e6e67

    • SHA256

      5a92d770d34718ab6624c95d586269cb9d144803cb0f94ea91b78344360eb5cf

    • SHA512

      5ba8603f9a2e8606620430198002fb7e91491db0bc5dfad354ccc70024c8fcfd631ba0e34af2615bb569e6946705811253be136b5b1f6970567b579f78912ab2

    • SSDEEP

      12288:a/ysGty1fTXeVCs9mLzGoPbAU6TNuUjFwCbxvVaMOo+961u:a/ysGtEfTuVDmPZbwTN1jPlvVaP5I1u

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Tasks