General

  • Target

    f3761ed191aeddf0e23bba17e361229d81547309dac3b451202df849083b7916.hta

  • Size

    116KB

  • Sample

    241007-ck17vsyhqr

  • MD5

    bac652fa9a932e3f71411fb993010377

  • SHA1

    0dbe1f2b08510b57f0e00189d2355f57e300c47f

  • SHA256

    f3761ed191aeddf0e23bba17e361229d81547309dac3b451202df849083b7916

  • SHA512

    0ab2913b55e1f60cdb26f003d2c17b492385a43bca2d2c5acb1a659c9a5ed3d232eeceb8b0d4b68ffad11599dab9c27d16d1c990f23e54ea3a8ccd73a4de536f

  • SSDEEP

    96:Ea+M73mAWZeuhtAWZDuhogROBHRj/oyYJQAWZSAWZXuhdAWZkAT:Ea+Q3mVkuhtVVuhhRwHxY+VgVFuhdVZT

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      f3761ed191aeddf0e23bba17e361229d81547309dac3b451202df849083b7916.hta

    • Size

      116KB

    • MD5

      bac652fa9a932e3f71411fb993010377

    • SHA1

      0dbe1f2b08510b57f0e00189d2355f57e300c47f

    • SHA256

      f3761ed191aeddf0e23bba17e361229d81547309dac3b451202df849083b7916

    • SHA512

      0ab2913b55e1f60cdb26f003d2c17b492385a43bca2d2c5acb1a659c9a5ed3d232eeceb8b0d4b68ffad11599dab9c27d16d1c990f23e54ea3a8ccd73a4de536f

    • SSDEEP

      96:Ea+M73mAWZeuhtAWZDuhogROBHRj/oyYJQAWZSAWZXuhdAWZkAT:Ea+Q3mVkuhtVVuhhRwHxY+VgVFuhdVZT

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Evasion via Device Credential Deployment

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks