General

  • Target

    tax-invoice-0711.zip

  • Size

    515KB

  • Sample

    241008-pvnezaxfkl

  • MD5

    ae57b32dc1506af53e8afd3c3342d904

  • SHA1

    b20058ba2b0ba35e1d77ecab4b75affe6f0914ce

  • SHA256

    d275df9764628c52330d1cfcfe1e3c3eba4b29d536c825515128be883158c653

  • SHA512

    ae124c9b22227d064cdf2772f49069eaaff496875909d7a1e6b679caf169a67531a943d6494dcdd178bc996b56abc566e1bbbb77c82887cebfbb55b6c3e51afb

  • SSDEEP

    12288:Ty//fZq2N4BMeTSoUzs/mWQtdeaz/6HmrW1RmVlI5:Ty//TYMEShzoyreajQ0I5

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6515689087:AAEnerpIS1xuf83Wz7mf2-PPkvlmor9Mt7U/sendMessage?chat_id=1015404316

Targets

    • Target

      tax-invoice-0711.exe

    • Size

      526KB

    • MD5

      d25d303ca9ec88e005cbab9f35d4d210

    • SHA1

      3c037df248b5b25e139cc7fc6142e6cd371446a3

    • SHA256

      dcf3ebaa281f05217097685b485ab9b56711ed87679cf755ee82ebfa4479c01e

    • SHA512

      fe416e58f5f32c7807bba84bd3c33376130a841e89afc7b4c3fd10d38c779d1fb1636a4f85501d69e99e8b9aca06ec65538667daa64ccdb259522e584feb00c1

    • SSDEEP

      12288:xf0D4BQWzdAUxsfSWSLne4ZdzkpnRmkYwhX83X4Nu1jW:xhQQZxmoze47KRmkYwxmXk6S

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks