General

  • Target

    MB263350411AE.exe

  • Size

    599KB

  • Sample

    240508-jfxr7scb64

  • MD5

    3163a6168fc16f3641c22d3a8e9d75bd

  • SHA1

    b0c467c47e91d23cf21f400af048f91bc25aa9a8

  • SHA256

    11dc8824044bb1848e5675025a503ac5f37a277883f4522d0e8a4f238d049345

  • SHA512

    7eafd23dadab35d668f06ce27e221250f01fd559095ef328e89dade2a76de8a07406c92cfc544ea8e0ab153e9d84ac293b4c032ac79e3ba6ce7d4d17dcfb25d6

  • SSDEEP

    12288:oJXiAEfDZqLo4Ms/5Waw8FqRxfmngADi69JGi+G5iphWbKhKMkKDO:ARE7ZYo4Mq5Wb8Fsx+ngIx3AVhWbKGKO

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.speedhouseoman.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    SpH@0084

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.speedhouseoman.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    SpH@0084
C2

https://scratchdreams.tk

Targets

    • Target

      MB263350411AE.exe

    • Size

      599KB

    • MD5

      3163a6168fc16f3641c22d3a8e9d75bd

    • SHA1

      b0c467c47e91d23cf21f400af048f91bc25aa9a8

    • SHA256

      11dc8824044bb1848e5675025a503ac5f37a277883f4522d0e8a4f238d049345

    • SHA512

      7eafd23dadab35d668f06ce27e221250f01fd559095ef328e89dade2a76de8a07406c92cfc544ea8e0ab153e9d84ac293b4c032ac79e3ba6ce7d4d17dcfb25d6

    • SSDEEP

      12288:oJXiAEfDZqLo4Ms/5Waw8FqRxfmngADi69JGi+G5iphWbKhKMkKDO:ARE7ZYo4Mq5Wb8Fsx+ngIx3AVhWbKGKO

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks