General

  • Target

    2024-09-24_ac9cbafc6040928f36391100b5e63fcc_avoslocker_hijackloader

  • Size

    3.5MB

  • Sample

    240924-x5p1js1bnm

  • MD5

    ac9cbafc6040928f36391100b5e63fcc

  • SHA1

    2d2957e0b078c2680f97b4f2e23edb1573b27a46

  • SHA256

    839dd22c392ab35862cd5984c843292b9069dafef4a6b52c22fe958414c861a6

  • SHA512

    ace5af9b925a3aec2ac54b8e0814b93c71cb244a8ef197a9cd4cd569e026e7125e7296c8ac254eada1f49002018c00f5568b3de38668e328219849f936c5dc44

  • SSDEEP

    98304:enT0m9Lp46Ruq3OU/jIEeQfoR/IuOFVjUu5:ATB9dOq3FIF0wu

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6839394068:AAEgmde6OU-W-eNGJXPHD9JvEnnTtqhauBg/sendMessage?chat_id=6475103768

Targets

    • Target

      2024-09-24_ac9cbafc6040928f36391100b5e63fcc_avoslocker_hijackloader

    • Size

      3.5MB

    • MD5

      ac9cbafc6040928f36391100b5e63fcc

    • SHA1

      2d2957e0b078c2680f97b4f2e23edb1573b27a46

    • SHA256

      839dd22c392ab35862cd5984c843292b9069dafef4a6b52c22fe958414c861a6

    • SHA512

      ace5af9b925a3aec2ac54b8e0814b93c71cb244a8ef197a9cd4cd569e026e7125e7296c8ac254eada1f49002018c00f5568b3de38668e328219849f936c5dc44

    • SSDEEP

      98304:enT0m9Lp46Ruq3OU/jIEeQfoR/IuOFVjUu5:ATB9dOq3FIF0wu

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks