General

  • Target

    49917f413cbf883715a5f6e5a30cb13abafc693ec296751ba8b1bdbc3142e8c5.exe

  • Size

    779KB

  • Sample

    241107-ctw99svrgq

  • MD5

    fb1ddd3d10ca671f437c6f2f3c9d6e57

  • SHA1

    7bd24b6b4a1e30c7bd2ec0cfbe886021a902c912

  • SHA256

    49917f413cbf883715a5f6e5a30cb13abafc693ec296751ba8b1bdbc3142e8c5

  • SHA512

    5edfb4ccde93569c171b48eeac48026bb42d4cdbd791a5833945c5e4d775abdfb2529b04aac798fcabc5b1ef91b9eacbb6ea13452b27db98dbb55569eb337496

  • SSDEEP

    12288:GTfOxmCKE2pb57IF0kVtn1IyyMgGpT1dl2veI0ay3MxyNALB:GS2t5sF0Gn1TcGB/l2veb8B

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    50.31.176.103
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    HW=f09RQ-BL1

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://50.31.176.103/
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    HW=f09RQ-BL1

Targets

    • Target

      49917f413cbf883715a5f6e5a30cb13abafc693ec296751ba8b1bdbc3142e8c5.exe

    • Size

      779KB

    • MD5

      fb1ddd3d10ca671f437c6f2f3c9d6e57

    • SHA1

      7bd24b6b4a1e30c7bd2ec0cfbe886021a902c912

    • SHA256

      49917f413cbf883715a5f6e5a30cb13abafc693ec296751ba8b1bdbc3142e8c5

    • SHA512

      5edfb4ccde93569c171b48eeac48026bb42d4cdbd791a5833945c5e4d775abdfb2529b04aac798fcabc5b1ef91b9eacbb6ea13452b27db98dbb55569eb337496

    • SSDEEP

      12288:GTfOxmCKE2pb57IF0kVtn1IyyMgGpT1dl2veI0ay3MxyNALB:GS2t5sF0Gn1TcGB/l2veb8B

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks