General

  • Target

    115f6d94f2fd77eda6b81780e8051f0d

  • Size

    665KB

  • Sample

    231224-zeeg8sdbd8

  • MD5

    115f6d94f2fd77eda6b81780e8051f0d

  • SHA1

    984bc609ef9c5da154a3d442051f3a9a0725ee23

  • SHA256

    486032726bf8f655211586986bdc0e49f0149c0a85cfaebf1ff8c28e0587bc85

  • SHA512

    f4c00cbc727885c482a752322844775fcbf854c1607966654307e9c9077060689050a5326bbacee278c4e04024a29f945a5622384c788d9f4f65a50f4ad035b3

  • SSDEEP

    12288:tCtQvsls8COsBgo0q4wM90bVCW1VaZ3YDeoyi8hJHf5gCyKtytmLa:tCtQvwCOsBgo0q4wMSb31VaVUDyiAKCc

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      115f6d94f2fd77eda6b81780e8051f0d

    • Size

      665KB

    • MD5

      115f6d94f2fd77eda6b81780e8051f0d

    • SHA1

      984bc609ef9c5da154a3d442051f3a9a0725ee23

    • SHA256

      486032726bf8f655211586986bdc0e49f0149c0a85cfaebf1ff8c28e0587bc85

    • SHA512

      f4c00cbc727885c482a752322844775fcbf854c1607966654307e9c9077060689050a5326bbacee278c4e04024a29f945a5622384c788d9f4f65a50f4ad035b3

    • SSDEEP

      12288:tCtQvsls8COsBgo0q4wM90bVCW1VaZ3YDeoyi8hJHf5gCyKtytmLa:tCtQvwCOsBgo0q4wMSb31VaVUDyiAKCc

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • CustAttr .NET packer

      Detects CustAttr .NET packer in memory.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks