General

  • Target

    malw.exe

  • Size

    603KB

  • Sample

    241101-rl2x4szmas

  • MD5

    39c7da67656e52cfe66f0fb0a223cdee

  • SHA1

    3dd0f07f64387e25ebba373ac9557cc7941ded55

  • SHA256

    a1b4af5ce8cb01ceddb2c9269dafbea2c5c9340e21a916a59b304158110aa4c5

  • SHA512

    b21d56b7ae71993d7d4456d1fa0f7ce4d90049aedd5d6685da709b8e213aa51388e3f8a7d21e5806d45bf579d96a9eab7a94f3ba2905c8e5f7059c1b5620a4c8

  • SSDEEP

    12288:woaDPw1Qk89Tmyy8e9vLr78Ly3KzgGUsB/gRZYHdh:gLw9gTFyXjvgy3Kz/UKWqd

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    50.31.176.103
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    HW=f09RQ-BL1

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://50.31.176.103/
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    HW=f09RQ-BL1

Targets

    • Target

      malw.exe

    • Size

      603KB

    • MD5

      39c7da67656e52cfe66f0fb0a223cdee

    • SHA1

      3dd0f07f64387e25ebba373ac9557cc7941ded55

    • SHA256

      a1b4af5ce8cb01ceddb2c9269dafbea2c5c9340e21a916a59b304158110aa4c5

    • SHA512

      b21d56b7ae71993d7d4456d1fa0f7ce4d90049aedd5d6685da709b8e213aa51388e3f8a7d21e5806d45bf579d96a9eab7a94f3ba2905c8e5f7059c1b5620a4c8

    • SSDEEP

      12288:woaDPw1Qk89Tmyy8e9vLr78Ly3KzgGUsB/gRZYHdh:gLw9gTFyXjvgy3Kz/UKWqd

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks