General

  • Target

    026a9146b7249b04d1d1045ac03fac50b8adbc46bed20ff6f81e83e0408c63cc

  • Size

    528KB

  • Sample

    240904-r9a5astepd

  • MD5

    8b1ba1dc783a6d04196d0418bd96c974

  • SHA1

    44faff698c93b69ce0eea90a60e1db7c01e45684

  • SHA256

    026a9146b7249b04d1d1045ac03fac50b8adbc46bed20ff6f81e83e0408c63cc

  • SHA512

    6060804f4cc292d1974d24a36f88177c81e52829748fab31eb74740df3099faa4ccbf65c4c292781098f1d17a750275d5017963766a25613d0cc968f46f6b5b5

  • SSDEEP

    12288:6+tGMQRSXgohCaouHDUDS0ZwRmqJB1co5C4Je:1gDgXgohVouHQDS0ZEd1c8lk

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.speedhouseoman.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    SpH@0084

Targets

    • Target

      d43fa50daa883b42bb53678fcb1a9e956bbdb6bb6256ddaefcf5e4dadad450dd.exe

    • Size

      552KB

    • MD5

      70aaa3cfe01401db8f01fdf377138094

    • SHA1

      7523fe037a1be040dc180e86ef1395e893e1d87c

    • SHA256

      d43fa50daa883b42bb53678fcb1a9e956bbdb6bb6256ddaefcf5e4dadad450dd

    • SHA512

      fbf2ee8a9a4e449a7cd7d59ddfda3feb34acee4ad98e405ddca679281ec60d6ecfb03457c8412721893856304e86c64f56c498b63c0c29be901809c2e48813d3

    • SSDEEP

      12288:w8QdRlF6YLqGfrds/2s0yADkpixHp+V2pX+9EmgiW:ORv6/Gfr82s0yixHkV24Sm4

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks