General

  • Target

    e01a751a8d6a089d25eccf34c504a5b0

  • Size

    644KB

  • Sample

    240326-zz5vxsfd3z

  • MD5

    e01a751a8d6a089d25eccf34c504a5b0

  • SHA1

    58198c6cfa650df0609cb1dd931a59ebe6388d0f

  • SHA256

    524bd24b076dc2580ced18f98ee98ab54d528f5fc8ffe02bdda47fa557feeb3c

  • SHA512

    c83b57f3ae4340f74888a18a7d557157ae339934004febe871fe3df8c7245884b4038957a0487b3d85f52926b8f132284e0052e5017849c49c3103876267c7e0

  • SSDEEP

    12288:z1/p+gczyhNSvRbBQHR4qz91hI0zSaNsvz+yuWDVId21NaI+E8tyvX6sJD37USqY:TsJDLjqb5cIX5zpwg0srHFD

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      e01a751a8d6a089d25eccf34c504a5b0

    • Size

      644KB

    • MD5

      e01a751a8d6a089d25eccf34c504a5b0

    • SHA1

      58198c6cfa650df0609cb1dd931a59ebe6388d0f

    • SHA256

      524bd24b076dc2580ced18f98ee98ab54d528f5fc8ffe02bdda47fa557feeb3c

    • SHA512

      c83b57f3ae4340f74888a18a7d557157ae339934004febe871fe3df8c7245884b4038957a0487b3d85f52926b8f132284e0052e5017849c49c3103876267c7e0

    • SSDEEP

      12288:z1/p+gczyhNSvRbBQHR4qz91hI0zSaNsvz+yuWDVId21NaI+E8tyvX6sJD37USqY:TsJDLjqb5cIX5zpwg0srHFD

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Discovery

Query Registry

6
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

4
T1082

Peripheral Device Discovery

1
T1120

Tasks