General

  • Target

    f04d67cb7677014fce76d3eb4eb14513f06e968241cb9e02378cd64ddca96c3d.rar

  • Size

    506KB

  • Sample

    240908-rcz26azdpq

  • MD5

    d7be5bbdd4b360ac514c0a7e24af2865

  • SHA1

    46fadd8b5d9248f28b0f01c8c4ae5da7fe56303d

  • SHA256

    f04d67cb7677014fce76d3eb4eb14513f06e968241cb9e02378cd64ddca96c3d

  • SHA512

    7cfb6853e5cf1c52def44224a1a5e241f94b8f0f629c9b0d44663a9e69fbba59a8937de2c93f8945531b5f8b59f7f55e35500234e3c0fce21b71e0247f356dd4

  • SSDEEP

    12288:mP4y8vTx8WcERmw/wObKF2B81/ZqVUUY63i+QBKoC9oAk+9xY6Vf:mP4y8rx+E/82B3UL6pQBKF9oiTVf

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      DOC030222-03022022133454.exe

    • Size

      70.0MB

    • MD5

      bd57b0a1274b9f3b72e3e6dc16987f78

    • SHA1

      9909c6463eec32f6a0b57d86a89c8746c1c0e431

    • SHA256

      544bcd37f2451628755df5917671493844a63efbc5056dac8ebf84f25f788288

    • SHA512

      da2eb06866b494e3ef106a03593610e8bc4bec7702c24640c5d82d9a2235eea84f39aa7efc67eadff6908c897e922921f32da8588ddea734a9defc8630ddf80c

    • SSDEEP

      12288:gb28w2UdchuF+PzldKSL7V9J7Q/2Hj98r6FN+60:J8lCMuF5U9VQ/2HjsY+6

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks