General

  • Target

    4b0a935fbc037ea00bf17468d4cf5b85.bin

  • Size

    588KB

  • Sample

    240403-bqa27abf85

  • MD5

    fefaaaabe00b947022319abedbf047b5

  • SHA1

    59b4cec33e57b111b43ea511bb40644910d59707

  • SHA256

    e3364410363952f872fec3e73a9cd7945aa1d25b5b2fcb137b4cc57d33452f4f

  • SHA512

    357b9e4c72830993ad37ebe3ee12bff39decf7107e9df7c0b9a2882ed04edd55afe44a1f92b5b1b883db515b2fe00ecbaca39d45a40ab2b83ba98cee9ad8b5b1

  • SSDEEP

    12288:foecbEslu5gI7yiQnTv2S/uojrBi9+o3pvlkiIQ+EkHGkCqTprRYjwji:Qy5R7yf748Bi9+gdkG+E9kVTMjci

Malware Config

Extracted

Family

snakekeylogger

C2

https://scratchdreams.tk

Targets

    • Target

      0d9bd2ae2e4b023047b6c08684e9e5daae76e31cced4c3fdf4640136245f7eea.exe

    • Size

      725KB

    • MD5

      4b0a935fbc037ea00bf17468d4cf5b85

    • SHA1

      169cd19c1d29bebd2c7fe5a8de25b1429f8f2aed

    • SHA256

      0d9bd2ae2e4b023047b6c08684e9e5daae76e31cced4c3fdf4640136245f7eea

    • SHA512

      0bee469d0188505772af1fd9af4a6710c201475340045b97024102a63aaba14f940e6ee36d118d338e836b4ee7ba03387001ce81724c4f4433123f5b9d83dd4f

    • SSDEEP

      12288:w6Wq4aaE6KwyF5L0Y2D1PqL5C38Lua13KVsrOQW60Ztsmhv3:GthEVaPqL58F2rBjmB3

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks