General

  • Target

    4bec8930b1157e64e7d785c62f4fcc4d5d144daeb954144ee3f3a5648820a9a2.exe

  • Size

    711KB

  • Sample

    241109-c24z3syjaj

  • MD5

    6ccd423abcf6bb68539f4c70419d6fc3

  • SHA1

    450d3110f5eca86f20823b61a4ef43fe5f35edd4

  • SHA256

    4bec8930b1157e64e7d785c62f4fcc4d5d144daeb954144ee3f3a5648820a9a2

  • SHA512

    7fc9ac53ab49470c812155ab184bb2e260de2b618492a8cfc507a7520a331327bdd553a639201da085324d8f2bbe8c9e9b20b4528f3b2e5f9aece323ad47d196

  • SSDEEP

    12288:eEEH0GapWzLehoBHUsu4xifZ6R6auv2VLEN714g2OkvqHbFweV:XEH4pBhtHhm61uLEN7urSbFwe

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    50.31.176.103
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    HW=f09RQ-BL1

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://50.31.176.103/
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    HW=f09RQ-BL1

Targets

    • Target

      4bec8930b1157e64e7d785c62f4fcc4d5d144daeb954144ee3f3a5648820a9a2.exe

    • Size

      711KB

    • MD5

      6ccd423abcf6bb68539f4c70419d6fc3

    • SHA1

      450d3110f5eca86f20823b61a4ef43fe5f35edd4

    • SHA256

      4bec8930b1157e64e7d785c62f4fcc4d5d144daeb954144ee3f3a5648820a9a2

    • SHA512

      7fc9ac53ab49470c812155ab184bb2e260de2b618492a8cfc507a7520a331327bdd553a639201da085324d8f2bbe8c9e9b20b4528f3b2e5f9aece323ad47d196

    • SSDEEP

      12288:eEEH0GapWzLehoBHUsu4xifZ6R6auv2VLEN714g2OkvqHbFweV:XEH4pBhtHhm61uLEN7urSbFwe

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks