General

  • Target

    7132dd68e16f843b9c7e21b9d78c299dd4ff67317a4cf437cb6104c3b7fb4cb2.exe

  • Size

    712KB

  • Sample

    240925-cc7dxa1djc

  • MD5

    a09dbf6d11330b592cc18b36917b27b0

  • SHA1

    24720a41f8a94b7ddd7691573d464aab99698819

  • SHA256

    7132dd68e16f843b9c7e21b9d78c299dd4ff67317a4cf437cb6104c3b7fb4cb2

  • SHA512

    f2ca7baaa0c0dd466dcaae2df18e2d2683768ac39e114123d689c5a31a4fe5dc4695593f4a8e3ee61da531ae604f56edc3a50cebf4c414c4456ac52a5b4806a8

  • SSDEEP

    12288:feqYIb0vP9FVYhWV75R5GM1d7VH16xZnAyhwO3+kxFgP/mYpMK+9elHa9rV:feq3e9kh87v5GGt16xVAG7n9ec9h

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      7132dd68e16f843b9c7e21b9d78c299dd4ff67317a4cf437cb6104c3b7fb4cb2.exe

    • Size

      712KB

    • MD5

      a09dbf6d11330b592cc18b36917b27b0

    • SHA1

      24720a41f8a94b7ddd7691573d464aab99698819

    • SHA256

      7132dd68e16f843b9c7e21b9d78c299dd4ff67317a4cf437cb6104c3b7fb4cb2

    • SHA512

      f2ca7baaa0c0dd466dcaae2df18e2d2683768ac39e114123d689c5a31a4fe5dc4695593f4a8e3ee61da531ae604f56edc3a50cebf4c414c4456ac52a5b4806a8

    • SSDEEP

      12288:feqYIb0vP9FVYhWV75R5GM1d7VH16xZnAyhwO3+kxFgP/mYpMK+9elHa9rV:feq3e9kh87v5GGt16xVAG7n9ec9h

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks