General

  • Target

    snakekeylogger.zip

  • Size

    496KB

  • Sample

    241019-yd85savbpb

  • MD5

    85d3b88f8762618b2b164e9215ac5ab2

  • SHA1

    5245c6de313a47b2d1bdb648d0930fd4b87cec50

  • SHA256

    c1552a429731fd841c35decf4dc2b2db7abf19f9281dd3c4c04439331ce8a69f

  • SHA512

    44b6175164b3f650da3800c96679be128bd1d6993e9993fa9bae19478ef13b869a63cab8b36b4ade7714aa97d4ea10d610e4f93cc8ce20a7842604c56136d88f

  • SSDEEP

    12288:zXdSXZu8Z3Qve4lmAfxfQDkNVwsoXABOj/qwzMheb:zEA8Z3z4lpfxwzDA3Gb

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      ec241a262db494a9d7ba5a4f916376fa89cec1830846ffd396fa4869cbb52f9e.exe

    • Size

      618KB

    • MD5

      6e9f35ee6a2d29698b248c047d7d6934

    • SHA1

      b6d664d46551a496f1264aba26b18c5651d326be

    • SHA256

      ec241a262db494a9d7ba5a4f916376fa89cec1830846ffd396fa4869cbb52f9e

    • SHA512

      473b490a0c62ed3c7314efaa91a464e4c60c21151b8eb400f42fcd39cc0a1a43289bf0d1e2c91614c879e679d1081f0ea0e22e17cad2cf6b39ba642b6559a932

    • SSDEEP

      12288:cysSIqE2ERm+m359N77qRKkjylNBVvpQFU66oX:lfGzcN77qIkWlNBnQp

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks