General

  • Target

    16359c43466ea68f824825178d9dfd58784c95a2f88157ed52f1f0a3d321e15d

  • Size

    642KB

  • Sample

    241026-xjvc5sycnr

  • MD5

    b07572205f266f5cea703bc6ccf74f39

  • SHA1

    a0d45cfc2f4ecc337ce7aa48c48c8a341819e6e8

  • SHA256

    16359c43466ea68f824825178d9dfd58784c95a2f88157ed52f1f0a3d321e15d

  • SHA512

    eeafe01426bcbb807d6fed665cd97f1c174fd46253e2600aeeb20dbc551bd128b5c075bdd4efb1c44c73d38dc877b05caeca39d59976eb69c542c71df741f4ba

  • SSDEEP

    12288:QoNoqGHHqkMd05IninF+YhN3to0+YDB+gstfk3bUhc:QoNKHK+I2kYhN3twPObc

Malware Config

Targets

    • Target

      16359c43466ea68f824825178d9dfd58784c95a2f88157ed52f1f0a3d321e15d

    • Size

      642KB

    • MD5

      b07572205f266f5cea703bc6ccf74f39

    • SHA1

      a0d45cfc2f4ecc337ce7aa48c48c8a341819e6e8

    • SHA256

      16359c43466ea68f824825178d9dfd58784c95a2f88157ed52f1f0a3d321e15d

    • SHA512

      eeafe01426bcbb807d6fed665cd97f1c174fd46253e2600aeeb20dbc551bd128b5c075bdd4efb1c44c73d38dc877b05caeca39d59976eb69c542c71df741f4ba

    • SSDEEP

      12288:QoNoqGHHqkMd05IninF+YhN3to0+YDB+gstfk3bUhc:QoNKHK+I2kYhN3twPObc

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks