General

  • Target

    79861c58558e7cd10c66a41edda287077ce8ee7516060066a21f254a85aef72e

  • Size

    540KB

  • Sample

    241106-m92j2azbpr

  • MD5

    af270d746eefa5e32cfad0ef3a77fe27

  • SHA1

    3af69a53603fde1ed3e8bf29dde183c2502fe8d1

  • SHA256

    79861c58558e7cd10c66a41edda287077ce8ee7516060066a21f254a85aef72e

  • SHA512

    d51dac8b00fb414c0b1e0421fb17edc4f2dc93b0876024d7738ebf8b46e65d72c0d98cd5545981c5a18882468313d240ad879492616becc343eeca7130a7b079

  • SSDEEP

    12288:puXITue0qDCtCMYfEJqigPVorNLlQeOeGXV6ZA7ujEl:UpvYfqqigPVorPXTfEl

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.murchisonspice.co.za
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    orders786q#

Targets

    • Target

      Contract.exe

    • Size

      571KB

    • MD5

      1bc8a8efa890196a91f54124e2b4b30f

    • SHA1

      3436f66f6af1fc6698e5ef631386465da692ee33

    • SHA256

      1bed29c0a6409a825cc6c5d3cfe488a5524432c0ccb2e896a44c7bc87d252f22

    • SHA512

      e5bf2b6110b31f0760f2fceb7372df2f146f8e79612468c556439834c0e344d7fada1e07d7739009fff15c50e39bf668246b8a6b37259876c343d446c85e3e62

    • SSDEEP

      12288:uUPZbEeX/C9M5YrN17Iq+PoQeSeAXVf4Y1BRMQ0b2r8lM4:uUPh//C9M5Yx1T+oXHubRI1lM4

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks