General

  • Target

    d7be5bbdd4b360ac514c0a7e24af2865.bin

  • Size

    502KB

  • Sample

    240909-b3hykayarh

  • MD5

    4f747bc3a874bb199252abbb1fc5cb9e

  • SHA1

    5b84bfd1d456111b6091d89f6e3abba9b17c297d

  • SHA256

    84e981533ba050914811f5018ad09a233283645117940a9c7d509085d7c13f71

  • SHA512

    29be3ecb430ad13c352b19ab5842e3836f43600c64138e38323d4e8eb0469fc3c1f80716dba16cd55d0edcd12de714f6d17f3d8d078c6e7fee593fc64e2d29b3

  • SSDEEP

    12288:Dj520SK1fFFC4rq66QokLfYxE5hxC8K2dvn2g0DwNfHV:vfFFC4m9kP3K8Tl

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      DOC030222-03022022133454.exe

    • Size

      70.0MB

    • MD5

      bd57b0a1274b9f3b72e3e6dc16987f78

    • SHA1

      9909c6463eec32f6a0b57d86a89c8746c1c0e431

    • SHA256

      544bcd37f2451628755df5917671493844a63efbc5056dac8ebf84f25f788288

    • SHA512

      da2eb06866b494e3ef106a03593610e8bc4bec7702c24640c5d82d9a2235eea84f39aa7efc67eadff6908c897e922921f32da8588ddea734a9defc8630ddf80c

    • SSDEEP

      12288:gb28w2UdchuF+PzldKSL7V9J7Q/2Hj98r6FN+60:J8lCMuF5U9VQ/2HjsY+6

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks