General

  • Target

    04fef3eadffd06e1b7ad1358dd8b6cde.bin

  • Size

    588KB

  • Sample

    240403-bcvvfaba72

  • MD5

    2be5100b916c98fac056df62dbfdddb2

  • SHA1

    146f1c9f77fc71bf71db60ffe84349e7ffdf2eda

  • SHA256

    d1583a02b935ae8b99a85c1c06db78d2b1180c52eb089fef20da2299c0776cd1

  • SHA512

    e2a8eef29a91fff9a7b550a064698ce47e279334e38fc29f55a267cb2133282764eef6f5c548f50a85a2780d88574e05dce1ba290c27ca802cae5d6867dfcabf

  • SSDEEP

    12288:Khyj0pUBZie4qrD3ZSYBg+jyYolAMsw+7ERP4+5UffVL:Kh4j8PbUw+7qZ5qtL

Malware Config

Extracted

Family

snakekeylogger

C2

https://scratchdreams.tk

Targets

    • Target

      OURO08765.exe

    • Size

      725KB

    • MD5

      4b0a935fbc037ea00bf17468d4cf5b85

    • SHA1

      169cd19c1d29bebd2c7fe5a8de25b1429f8f2aed

    • SHA256

      0d9bd2ae2e4b023047b6c08684e9e5daae76e31cced4c3fdf4640136245f7eea

    • SHA512

      0bee469d0188505772af1fd9af4a6710c201475340045b97024102a63aaba14f940e6ee36d118d338e836b4ee7ba03387001ce81724c4f4433123f5b9d83dd4f

    • SSDEEP

      12288:w6Wq4aaE6KwyF5L0Y2D1PqL5C38Lua13KVsrOQW60Ztsmhv3:GthEVaPqL58F2rBjmB3

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Drops startup file

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks