General

  • Target

    fddd99d918c32a807cd1761c519b086b.bin

  • Size

    964KB

  • Sample

    240829-cfczgayakb

  • MD5

    820e09db54c449e81135b4e3b3a2ae49

  • SHA1

    a02227f75928e3f38ee0bb64a1a693480f16e14d

  • SHA256

    017e5b7d68e109d875d58186b54eb613a3ceef3d54052b19fa4b9adcfea19cff

  • SHA512

    49a6a1980e3c65cb4bc29de0790bac7633f1af0e8a53c6c9c90787b9b01024e95f321b3ec22127df0f62c650e418eefeb2cae434dc9fbda109f777129ee7b3c2

  • SSDEEP

    24576:o2756KFEBXpSw6c7KHwAxcbu2JmhT6EjL/9NqMyQ:ZMAuoHh2u+mhuuNqMyQ

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      5cd8e28712872382cacac0d338a4d041e291b89d41a4daf69eabefe7ec46f920.exe

    • Size

      1.1MB

    • MD5

      fddd99d918c32a807cd1761c519b086b

    • SHA1

      8cf7e4c454f20d2ab851bb6e18a4250b7af4157c

    • SHA256

      5cd8e28712872382cacac0d338a4d041e291b89d41a4daf69eabefe7ec46f920

    • SHA512

      5243ba74b6919a3d96dffda1a598c47a3ce80426136abe769fa19bf9a138de64a7db87efb2a5cfe6c7bb1e5bdc8655169defe54ee79d3d7ebe16817807ebb06a

    • SSDEEP

      24576:ZlmXjCShkN8Hy//wZhBcV7ilbN1/39e48e:ZlmXjCJN8SXwVL1/9e48e

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks