General

  • Target

    Business_License_and_order_confirmation.zip

  • Size

    506KB

  • Sample

    241003-szj5wswdmg

  • MD5

    65507e7009e8894d5ab6cf4a612da5c4

  • SHA1

    d3ad1357b314de44a22f62004e1d55da94fd5b15

  • SHA256

    75f46aca8782194fef67c5df2632a76736674afa4b5791d44ca3d30e039754bc

  • SHA512

    26cfb0367ffad8f9bed5486b244bf8add1bbbf74fcc0bc6b9bd69f8db058551fdf4982e201cbf166f8c33736e3097b317de6a52800ed6b65417c6ee2594c2179

  • SSDEEP

    6144:5cf/hZqSw98xAVoqagYAydOKRVAX88EbtVknTS1UcLAWqSL8AXl4mWDq7c4MS3c+:5cXhNBmwZSTyUcmq8AXiukg

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6515689087:AAEnerpIS1xuf83Wz7mf2-PPkvlmor9Mt7U/sendMessage?chat_id=1015404316

Targets

    • Target

      Business_License_and_order_confirmation.exe

    • Size

      674KB

    • MD5

      9df7034c98b3290a35186546ca8c0028

    • SHA1

      8439a19f41bc2327615bc4bfe941d35fd7fc5fe7

    • SHA256

      fc2bdbad12bfe9fc0121328bab79347f90e2b45454f87fb8814162ab81040200

    • SHA512

      c43c042de886e5669661c505b85a7fa06f29d2551962f131627a4a727d952b0bcb0d66667b62d27e51263e2fb8dbc7facf968eef373d536b7015b6dc458f6e39

    • SSDEEP

      12288:MSBhH7RDsH9lRhr4LEATyUkYq8AP/ABsV7N5:/v76UjTy189s7N

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks