General

  • Target

    vbc.exe

  • Size

    374KB

  • Sample

    220705-verekschg6

  • MD5

    24e89d07e1071f93c8f8e0a03eeb7b9a

  • SHA1

    981c5c627491a6952c14921289e7d60ba819f019

  • SHA256

    70c021052ad4b72188bf5d6c960e668524c7d538e9d30e4991269f7a5e79a566

  • SHA512

    84b617ab92a58122c5167a13c67fed43ac3e336e7dcd2d73370a2f54c8a903d047bffd5a97a4dc08f1460ba685db9fc4daafd7edadebc2430f77666d5c0afb2f

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5471298201:AAGFh758keN2eA73SQlIsmB91r4EW74GWCo/sendMessage?chat_id=5144477649

Targets

    • Target

      vbc.exe

    • Size

      374KB

    • MD5

      24e89d07e1071f93c8f8e0a03eeb7b9a

    • SHA1

      981c5c627491a6952c14921289e7d60ba819f019

    • SHA256

      70c021052ad4b72188bf5d6c960e668524c7d538e9d30e4991269f7a5e79a566

    • SHA512

      84b617ab92a58122c5167a13c67fed43ac3e336e7dcd2d73370a2f54c8a903d047bffd5a97a4dc08f1460ba685db9fc4daafd7edadebc2430f77666d5c0afb2f

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger Payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Email Collection

1
T1114

Tasks