General

  • Target

    a2144ec73f793ed49255c96839a7a1f6.bin

  • Size

    645KB

  • Sample

    231011-mdklmsae24

  • MD5

    149571bc5d5ee772fcade4c8e44d2a8a

  • SHA1

    a91e7bb18bc9cd27826ae08f80ece4e8ef766527

  • SHA256

    6a6632df571865f0d0d5121862d40028c8ecaa7c52d8e5a82a69d4ef1f059aaa

  • SHA512

    1302e975d46da1565a75d26b3aaa224c2a479e0f903383b24de44ed8639e4c8ddd64858610eeadf616d24d450db686d670c1fc1b5580d0ee129ce42542322a50

  • SSDEEP

    12288:BFOsWP1oBF8aqAoi5ThiIqgAi8NJFjj6z53ejEfDgoQBQa3yQVxHBuE:DONyBF8WTVR8JFfOxrvEQsFBuE

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.product-secured.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    2V8SHFwjad34@@##

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.product-secured.com/
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    2V8SHFwjad34@@##

Targets

    • Target

      ef2d231629d0b364d24e83d2c8cbf4e870737490b158b98450e9bdb28056dfec.exe

    • Size

      812KB

    • MD5

      a2144ec73f793ed49255c96839a7a1f6

    • SHA1

      0f0e44b93259265f2fb77683a0a2bd808e79224f

    • SHA256

      ef2d231629d0b364d24e83d2c8cbf4e870737490b158b98450e9bdb28056dfec

    • SHA512

      a824da9932404d70783a34c8020e06fd1559ccbcac952134612c84b27ae9921239c6e5fdec1304174de95098617aa94ee742a41d1a01a7ba5bdcd227ef4d1fe5

    • SSDEEP

      12288:x1F4CB/szLMx0FAurlhhkXV6U+N5r9I+fU65Nu5rxbGAuH81WZwNY:p4dzLNFhhI2RIx2NuT7uHYY

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks