General

  • Target

    z70ORDENDECOMPRAURGENTE___s___x___l___x____.exe

  • Size

    786KB

  • Sample

    240520-yevc1seh81

  • MD5

    2eb9d2de619e8593a3f6170e239f63ff

  • SHA1

    6922327acc9e107c2473057131238cbc7d47b74b

  • SHA256

    0f6d369383b7b52c9973de3c3028f0dcf08726077047e7a39a8e30231c821c2d

  • SHA512

    37571a20f840f3ac123719bb651aa1acdbda6eeb56e46f8c985544328e83902feddb9051c3670811252aa9c8824fd34870b744b616f82b928f1e1d89d89f3049

  • SSDEEP

    12288:Tx3sR2w1G/XbqcU00QSSFneGjPKK3/m4NfKIHFQM1lCJJV+5:d8CbkQSSIG7KH4tfFbCJJg5

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.gbogboro.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Egoamaka@123
C2

https://scratchdreams.tk

Targets

    • Target

      z70ORDENDECOMPRAURGENTE___s___x___l___x____.exe

    • Size

      786KB

    • MD5

      2eb9d2de619e8593a3f6170e239f63ff

    • SHA1

      6922327acc9e107c2473057131238cbc7d47b74b

    • SHA256

      0f6d369383b7b52c9973de3c3028f0dcf08726077047e7a39a8e30231c821c2d

    • SHA512

      37571a20f840f3ac123719bb651aa1acdbda6eeb56e46f8c985544328e83902feddb9051c3670811252aa9c8824fd34870b744b616f82b928f1e1d89d89f3049

    • SSDEEP

      12288:Tx3sR2w1G/XbqcU00QSSFneGjPKK3/m4NfKIHFQM1lCJJV+5:d8CbkQSSIG7KH4tfFbCJJg5

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • UAC bypass

    • Windows security bypass

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Windows security modification

    • Accesses Microsoft Outlook profiles

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks