General

  • Target

    greatthingswithgreatideasgivenmerestthignstgood.hta

  • Size

    130KB

  • Sample

    241023-gtq6gawfrp

  • MD5

    b507badbce69dc67d803b7f3b1385036

  • SHA1

    b15c7634732a783b64414505ac4a5c095405f886

  • SHA256

    80b9bfa671f8626c76da94f0f39a03987278bd32e40851068a399bc69a4e05ca

  • SHA512

    a844a487906193c9265b67d7f3b1b617de3f227c205e043a1238cca7dbb9c1782480b001bd68de97cc86597e13205466bd433771b681d9b64bb4404f67f1abd3

  • SSDEEP

    96:Eam7xBVS9Mrv6VS9qrvpDCFl/Aoy58VS9sVS9QSrvdVS967T:Ea2xBQ9Gv6Q9wvaoiQ9sQ9QIvdQ9QT

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot8129252196:AAFb_vUYwennKVolbwpXf3vnDfT_yhozHns/sendMessage?chat_id=7004340450

Targets

    • Target

      greatthingswithgreatideasgivenmerestthignstgood.hta

    • Size

      130KB

    • MD5

      b507badbce69dc67d803b7f3b1385036

    • SHA1

      b15c7634732a783b64414505ac4a5c095405f886

    • SHA256

      80b9bfa671f8626c76da94f0f39a03987278bd32e40851068a399bc69a4e05ca

    • SHA512

      a844a487906193c9265b67d7f3b1b617de3f227c205e043a1238cca7dbb9c1782480b001bd68de97cc86597e13205466bd433771b681d9b64bb4404f67f1abd3

    • SSDEEP

      96:Eam7xBVS9Mrv6VS9qrvpDCFl/Aoy58VS9sVS9QSrvdVS967T:Ea2xBQ9Gv6Q9wvaoiQ9sQ9QIvdQ9QT

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Evasion via Device Credential Deployment

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks