General

  • Target

    PO_20248099-1 12,300PCS.exe

  • Size

    523KB

  • Sample

    240910-w7htkszcjg

  • MD5

    5db9f3f1609f4cd4df6f627977d09fd7

  • SHA1

    90bf0d85af20f8b712ea7e1fd9724e1ecb16589b

  • SHA256

    ea08961190b8399e21cfb503fcbb3caee0a5ab92294311bda03b7e511ece876b

  • SHA512

    03d708bf0d82863b667a3f91e284262ba58286580ad7214e0ec1008aba1760b21f3f518ffc7dc049887b2d099ecc0e92fc4a639f8811317fc535eae4c43659ef

  • SSDEEP

    12288:FlEEFet43oFyro4IZ/kHT7R6GJ9i/LH+F+KawP:Fnot43oFyoJZ/kHT7R6gz+Ka

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7196633070:AAEaQuZOF5M-L_385uI9rwN0ik3yySrTapE/sendMessage?chat_id=1343335992

Targets

    • Target

      PO_20248099-1 12,300PCS.exe

    • Size

      523KB

    • MD5

      5db9f3f1609f4cd4df6f627977d09fd7

    • SHA1

      90bf0d85af20f8b712ea7e1fd9724e1ecb16589b

    • SHA256

      ea08961190b8399e21cfb503fcbb3caee0a5ab92294311bda03b7e511ece876b

    • SHA512

      03d708bf0d82863b667a3f91e284262ba58286580ad7214e0ec1008aba1760b21f3f518ffc7dc049887b2d099ecc0e92fc4a639f8811317fc535eae4c43659ef

    • SSDEEP

      12288:FlEEFet43oFyro4IZ/kHT7R6GJ9i/LH+F+KawP:Fnot43oFyoJZ/kHT7R6gz+Ka

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks