General

  • Target

    a6d9ae46c1687dfe220b7a8295c3b3cb0e955b2a51581ee68e7443d8f87af4c4N

  • Size

    529KB

  • Sample

    241025-stblkasdln

  • MD5

    db1362e2986714756007ae7ce9da0050

  • SHA1

    ffc150cf4391290d19ad9d42906ebbada7f79a8e

  • SHA256

    a6d9ae46c1687dfe220b7a8295c3b3cb0e955b2a51581ee68e7443d8f87af4c4

  • SHA512

    1a0f054dcc5cbc4939a536a4b24ac3f23b77d6e96b4a8f71050b34fcf330fb65df26ef2d66b72775033eea2f6c1201072cec56a348987ce3ad18584066f3756a

  • SSDEEP

    12288:6LgoElqrVR9B5qeD9djDlngUS3OoCTWqpAz:6LT9rVRLQeD9djQ3O/K0Az

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6758088233:AAFj4Y2Zn6GDp8qtYIlHf1VVN4k4QQ5uaio/sendMessage?chat_id=5117030493

Targets

    • Target

      a6d9ae46c1687dfe220b7a8295c3b3cb0e955b2a51581ee68e7443d8f87af4c4N

    • Size

      529KB

    • MD5

      db1362e2986714756007ae7ce9da0050

    • SHA1

      ffc150cf4391290d19ad9d42906ebbada7f79a8e

    • SHA256

      a6d9ae46c1687dfe220b7a8295c3b3cb0e955b2a51581ee68e7443d8f87af4c4

    • SHA512

      1a0f054dcc5cbc4939a536a4b24ac3f23b77d6e96b4a8f71050b34fcf330fb65df26ef2d66b72775033eea2f6c1201072cec56a348987ce3ad18584066f3756a

    • SSDEEP

      12288:6LgoElqrVR9B5qeD9djDlngUS3OoCTWqpAz:6LT9rVRLQeD9djQ3O/K0Az

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks