General

  • Target

    2024-10-02_45beee362263f775f572b18a4aeec0de_avoslocker_hijackloader

  • Size

    8.6MB

  • Sample

    241002-xlsbkaveqd

  • MD5

    45beee362263f775f572b18a4aeec0de

  • SHA1

    fd32e703b282412371d06e800f35a4446482654d

  • SHA256

    410025278f63c2177d732ae410a4713a84d59167f3e92b48d779d071773e0ac9

  • SHA512

    f1d660cbf50cda72a377eb72e6347d4a47efd9c3c6a3552d855e808ecfe861e22f8c6e92f33c1504842d51335ab5aadff6d869e3555bfa202fb9c3983030114b

  • SSDEEP

    196608:sTB9dOqQTB9dOqoTB9dOq7TB9dOqXTB9dOq3FIF0wu:szdOqQzdOqozdOq7zdOqXzdOqv

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6839394068:AAEgmde6OU-W-eNGJXPHD9JvEnnTtqhauBg/sendMessage?chat_id=6475103768

Targets

    • Target

      2024-10-02_45beee362263f775f572b18a4aeec0de_avoslocker_hijackloader

    • Size

      8.6MB

    • MD5

      45beee362263f775f572b18a4aeec0de

    • SHA1

      fd32e703b282412371d06e800f35a4446482654d

    • SHA256

      410025278f63c2177d732ae410a4713a84d59167f3e92b48d779d071773e0ac9

    • SHA512

      f1d660cbf50cda72a377eb72e6347d4a47efd9c3c6a3552d855e808ecfe861e22f8c6e92f33c1504842d51335ab5aadff6d869e3555bfa202fb9c3983030114b

    • SSDEEP

      196608:sTB9dOqQTB9dOqoTB9dOq7TB9dOqXTB9dOq3FIF0wu:szdOqQzdOqozdOq7zdOqXzdOqv

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks