General

  • Target

    d43fa50daa883b42bb53678fcb1a9e956bbdb6bb6256ddaefcf5e4dadad450dd.exe

  • Size

    552KB

  • Sample

    240902-rnewcsscjq

  • MD5

    70aaa3cfe01401db8f01fdf377138094

  • SHA1

    7523fe037a1be040dc180e86ef1395e893e1d87c

  • SHA256

    d43fa50daa883b42bb53678fcb1a9e956bbdb6bb6256ddaefcf5e4dadad450dd

  • SHA512

    fbf2ee8a9a4e449a7cd7d59ddfda3feb34acee4ad98e405ddca679281ec60d6ecfb03457c8412721893856304e86c64f56c498b63c0c29be901809c2e48813d3

  • SSDEEP

    12288:w8QdRlF6YLqGfrds/2s0yADkpixHp+V2pX+9EmgiW:ORv6/Gfr82s0yixHkV24Sm4

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.speedhouseoman.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    SpH@0084

Targets

    • Target

      d43fa50daa883b42bb53678fcb1a9e956bbdb6bb6256ddaefcf5e4dadad450dd.exe

    • Size

      552KB

    • MD5

      70aaa3cfe01401db8f01fdf377138094

    • SHA1

      7523fe037a1be040dc180e86ef1395e893e1d87c

    • SHA256

      d43fa50daa883b42bb53678fcb1a9e956bbdb6bb6256ddaefcf5e4dadad450dd

    • SHA512

      fbf2ee8a9a4e449a7cd7d59ddfda3feb34acee4ad98e405ddca679281ec60d6ecfb03457c8412721893856304e86c64f56c498b63c0c29be901809c2e48813d3

    • SSDEEP

      12288:w8QdRlF6YLqGfrds/2s0yADkpixHp+V2pX+9EmgiW:ORv6/Gfr82s0yixHkV24Sm4

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks