General

  • Target

    53a0d54afb4eb2bd9165a13af16f64a17ae394e840ed94e274a94f3c4c686024.zip

  • Size

    527KB

  • Sample

    240724-b6d4sathmd

  • MD5

    69f8c5387e9a357c29a1b47bc72765d9

  • SHA1

    b28368414c9b4a44807ccdb2c99f2999a533c52d

  • SHA256

    53a0d54afb4eb2bd9165a13af16f64a17ae394e840ed94e274a94f3c4c686024

  • SHA512

    11e4d393094e554174b59227d3e4b1b42eb04f225c423fb84ee39eca74e188f9d77010e580029c5d174ddfaff6260302390dc58472f1c7faf14d7ca642a787da

  • SSDEEP

    12288:VXFTMH6obATUrXLjKUPqoWhbLYSlYqNk09MchYZKwqdO/St7021DWU:VVTM54cP58lgWh8KLWi702lWU

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.remfryson.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    CnG_23*NMA

Targets

    • Target

      Solar Solve Ltd Works Quote 16378.exe

    • Size

      552KB

    • MD5

      fdbffab12910e6d406fb7ee60afaf6ed

    • SHA1

      4d9ef1a9e7a99e2bc6da280b14705d0660cd27ac

    • SHA256

      bed59c144540d5cd1662becc04e1d7cb2c974023ae5cc1689d6070961561d8b1

    • SHA512

      b5fc68b675829b9c9ece4b782ba115da7e91b3c4d618de5e5b816a157e132da2b7bd48f068b212dfb3fa6f69ca67a81c996d23e291fd7505190bbcceafdbbf18

    • SSDEEP

      12288:NQdRlF6Xg81mRMTuQMcpYZKwq8sxGg5dc169iH2:yRv6Xt1mRMTuIp8KL8sv5dcIl

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks