General

  • Target

    608f84de59bd55d949b1188fd1b7e1bc5bd6607b2a69bbf1fb4a9420fbfda2aeN

  • Size

    513KB

  • Sample

    241018-jameaaxdjm

  • MD5

    acae534e5a5378ad442627c004e243e0

  • SHA1

    8bee01da1a5a0a901b565b0d655997c4ee9bb271

  • SHA256

    608f84de59bd55d949b1188fd1b7e1bc5bd6607b2a69bbf1fb4a9420fbfda2ae

  • SHA512

    29d49a84d8bf017be31caef65da7b4d23657ca843b1ed039ad52edd8ebb52c6862fb4036d65a06f9a6c17c5f090da3fbac31cec17ec53b12607d89343aaa2c13

  • SSDEEP

    12288:nUSl9Hj2dWAfEd7/l5t1dvMSwMpIxlto6X4o:Pl9j4g/lP1BMSh4ltD

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5945022662:AAH3tNDq2H4t2_2yAxq__TOQa3RMNliwRjM/sendMessage?chat_id=6147569474

Targets

    • Target

      608f84de59bd55d949b1188fd1b7e1bc5bd6607b2a69bbf1fb4a9420fbfda2aeN

    • Size

      513KB

    • MD5

      acae534e5a5378ad442627c004e243e0

    • SHA1

      8bee01da1a5a0a901b565b0d655997c4ee9bb271

    • SHA256

      608f84de59bd55d949b1188fd1b7e1bc5bd6607b2a69bbf1fb4a9420fbfda2ae

    • SHA512

      29d49a84d8bf017be31caef65da7b4d23657ca843b1ed039ad52edd8ebb52c6862fb4036d65a06f9a6c17c5f090da3fbac31cec17ec53b12607d89343aaa2c13

    • SSDEEP

      12288:nUSl9Hj2dWAfEd7/l5t1dvMSwMpIxlto6X4o:Pl9j4g/lP1BMSh4ltD

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks