General

  • Target

    file.exe

  • Size

    752KB

  • Sample

    210131-wwwc8ascla

  • MD5

    d89078bbe0d8a9268aafaff40e113ed9

  • SHA1

    fe4cedfa403a32311227871410e0abf998b6b8ef

  • SHA256

    1486a2ea19a9a383f1b5ce201a4a0ef973269094c87faa9458cfe913dd1e4a88

  • SHA512

    8f411e9ddab7eadeda75d8680dec43ace49c48a19f5c232033a0e1511cd7ac4c8c1acd0c53379c7a207bdf3dab66659c0bd24accdeddc8a080aeaddf68d518fb

Malware Config

Targets

    • Target

      file.exe

    • Size

      752KB

    • MD5

      d89078bbe0d8a9268aafaff40e113ed9

    • SHA1

      fe4cedfa403a32311227871410e0abf998b6b8ef

    • SHA256

      1486a2ea19a9a383f1b5ce201a4a0ef973269094c87faa9458cfe913dd1e4a88

    • SHA512

      8f411e9ddab7eadeda75d8680dec43ace49c48a19f5c232033a0e1511cd7ac4c8c1acd0c53379c7a207bdf3dab66659c0bd24accdeddc8a080aeaddf68d518fb

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger Payload

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates physical storage devices

      Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks