General

  • Target

    1c6d98ce8a37adc665452a1ca4bfa1fd5b347de7654578503527e28e90275f64.hta

  • Size

    115KB

  • Sample

    240928-bh4drs1fjd

  • MD5

    17116a0f43508549998ef6618154d77a

  • SHA1

    e71af8b0489263e476521a5fd6e22e5511369c4d

  • SHA256

    1c6d98ce8a37adc665452a1ca4bfa1fd5b347de7654578503527e28e90275f64

  • SHA512

    a6824f19100e0fd4c996ab8db64875fb1c0c0e4d045792793b45ad1e93cb358c6746289209d8d1f4634c6ebed9ade9e43a5b3407856780e7e60954efc249e9d9

  • SSDEEP

    96:Ea+M7wmf6PCZ60NUrnPmeobQk9B6/A6I6L1j+Z668AT:Ea+Qwmf6PCZ6kUTWfz6Y6dKZ6+T

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      1c6d98ce8a37adc665452a1ca4bfa1fd5b347de7654578503527e28e90275f64.hta

    • Size

      115KB

    • MD5

      17116a0f43508549998ef6618154d77a

    • SHA1

      e71af8b0489263e476521a5fd6e22e5511369c4d

    • SHA256

      1c6d98ce8a37adc665452a1ca4bfa1fd5b347de7654578503527e28e90275f64

    • SHA512

      a6824f19100e0fd4c996ab8db64875fb1c0c0e4d045792793b45ad1e93cb358c6746289209d8d1f4634c6ebed9ade9e43a5b3407856780e7e60954efc249e9d9

    • SSDEEP

      96:Ea+M7wmf6PCZ60NUrnPmeobQk9B6/A6I6L1j+Z668AT:Ea+Qwmf6PCZ6kUTWfz6Y6dKZ6+T

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Evasion via Device Credential Deployment

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks