General

  • Target

    197b6750c153562ea56de63788d04bc44afd2403c3aef62027b4c8ae7e5d9833.exe

  • Size

    528KB

  • Sample

    241119-vm6t8stldm

  • MD5

    0e4cf523eb0ec8f1d05373893e20e6b5

  • SHA1

    9d0913ead750e9e838b0be083459d6cf80d5f846

  • SHA256

    197b6750c153562ea56de63788d04bc44afd2403c3aef62027b4c8ae7e5d9833

  • SHA512

    a6d5ad35c6b790c6e34cafaebcb3930e3d7eafd91f43d79b68c79ee7eafbea6f829ca4db30cbd7316d528db665834bb8ed51adb55b4f98c5493c7cfac5614ca3

  • SSDEEP

    12288:Nn0nsDtXORI+det48HAh/+qiwxo62nSvQ/f2Zqq:N0nOXUI+dE4gAh/+qnp2eQWZx

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7720120586:AAEL1VybRIeGFqc29yI4D0-l0jQ_HF7ry5s/sendMessage?chat_id=6419839739

Targets

    • Target

      197b6750c153562ea56de63788d04bc44afd2403c3aef62027b4c8ae7e5d9833.exe

    • Size

      528KB

    • MD5

      0e4cf523eb0ec8f1d05373893e20e6b5

    • SHA1

      9d0913ead750e9e838b0be083459d6cf80d5f846

    • SHA256

      197b6750c153562ea56de63788d04bc44afd2403c3aef62027b4c8ae7e5d9833

    • SHA512

      a6d5ad35c6b790c6e34cafaebcb3930e3d7eafd91f43d79b68c79ee7eafbea6f829ca4db30cbd7316d528db665834bb8ed51adb55b4f98c5493c7cfac5614ca3

    • SSDEEP

      12288:Nn0nsDtXORI+det48HAh/+qiwxo62nSvQ/f2Zqq:N0nOXUI+dE4gAh/+qnp2eQWZx

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks