General

  • Target

    04102024_1500_04102024_Enquiry_20240210000.pdf.z

  • Size

    520KB

  • Sample

    241004-sdps9avbkd

  • MD5

    7bc5e475bb84e1142f280d4019033842

  • SHA1

    0e708922188f0ed7911ef19780d4fa590b3fff95

  • SHA256

    92c7039fc50117558741a51475f46a8318e3bf4c5cbe561b50a8312ec94ba5cb

  • SHA512

    b4915ba99c49efb6b7d852f7443927d2641fd04ab4945f25b1e93a747e899c8d784f4e4070ee58d87b3fafd3166666458a80816d3e1848d883d8704d000d9dd0

  • SSDEEP

    12288:OPDf1u5SXHcH60s6Q98SSqu6mnCqkZBLoWLmRbor2:Oz1u5S3cH6I3TRC/UWKpoC

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      Enquiry_20240210000.pdf.exe

    • Size

      618KB

    • MD5

      3ea0418567ac5a59f59094095df41e17

    • SHA1

      1a18e0028289315358716b7ed440dd983c0b0458

    • SHA256

      c3ba097fa559c09c855f8e4dfe8768c82d6d5005eadf4c4ea384b650ab54a06b

    • SHA512

      a227caba779eb5fe8ffec665e3afc436d0eeb0d4fa8be84ef5e8a60b4b22ae7dbefad166ea23a1930a56a8c6a8a0cd516a7c3057ce2073c6018817f626b832b9

    • SSDEEP

      12288:xXHmQWtBHPtkZB+W7WxY7HIkjJxppMbDkIvjUZKXf:BHm3tBlaBJ7g4HIklLIvjUZuf

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks