General

  • Target

    acbd111f6e01f7a02777bf50b95d61a352d476f031e7421f1fb356454a81e4e2.exe

  • Size

    531KB

  • Sample

    241119-fxy5tawkbm

  • MD5

    07ee6bc3f0ca6f6a5b7d0b9824a79cbf

  • SHA1

    3701b4dc923b624576038d327753580f768cfae0

  • SHA256

    acbd111f6e01f7a02777bf50b95d61a352d476f031e7421f1fb356454a81e4e2

  • SHA512

    5b90d27ca78c37aa7fd11ef225bf51a49be067c3d1c54b849b43d6f7d4902419cd769f6a42ea7166cab9624ec8ec6c9a90e24a763a866c4adb1ff7b1d8833428

  • SSDEEP

    12288:GAj/s0yek+BBlUVh+Z0D8MWoftBOMTCD8ztwerE6H1nN:5a07UtYAFJe9qZ

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7854764352:AAGsvrx8n7ByYi4c9ksbK9NcQWi81dzmeE8/sendMessage?chat_id=7894030394

Targets

    • Target

      acbd111f6e01f7a02777bf50b95d61a352d476f031e7421f1fb356454a81e4e2.exe

    • Size

      531KB

    • MD5

      07ee6bc3f0ca6f6a5b7d0b9824a79cbf

    • SHA1

      3701b4dc923b624576038d327753580f768cfae0

    • SHA256

      acbd111f6e01f7a02777bf50b95d61a352d476f031e7421f1fb356454a81e4e2

    • SHA512

      5b90d27ca78c37aa7fd11ef225bf51a49be067c3d1c54b849b43d6f7d4902419cd769f6a42ea7166cab9624ec8ec6c9a90e24a763a866c4adb1ff7b1d8833428

    • SSDEEP

      12288:GAj/s0yek+BBlUVh+Z0D8MWoftBOMTCD8ztwerE6H1nN:5a07UtYAFJe9qZ

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks