General

  • Target

    4d74cebd8ddaae78de8144f1abb245e5.bin

  • Size

    545KB

  • Sample

    241120-blc1zs1rhl

  • MD5

    c99e3f6c6450198525d8d03c1e82842b

  • SHA1

    89d8d1061280dfd21bc0854286bf4922e9037de9

  • SHA256

    081dcb8cacf9d7e6662451d93245e871b8b0368cedfa1e393a483b61037461ee

  • SHA512

    7809bfce4bbd51e9065b0852236153c63fe41bbbd0f5b4b96368e08bbe8e54360c64656c9cd1635f63a15130d67f15edd1caf5a6880c4aca2f6823ff7eeb299f

  • SSDEEP

    12288:FecvEDi3bps4JjTBoe4Ug8jJQfxgR2EHWvWGOu2qQR7ZyJjUjed3W:FecvkirJRTBodvyR2RviqQVMJjUGW

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot8071929169:AAFUKNAcxQ6ezyCHGQASc7PxQv_smeADnUQ/sendMessage?chat_id=5985897351

Targets

    • Target

      2a2625e85758dfdc4ab64036bb679f519b8802ecccdba37eec44fb99e68e35a9.exe

    • Size

      603KB

    • MD5

      4d74cebd8ddaae78de8144f1abb245e5

    • SHA1

      8e8423e4af53a91b9750014235773f9ec38916df

    • SHA256

      2a2625e85758dfdc4ab64036bb679f519b8802ecccdba37eec44fb99e68e35a9

    • SHA512

      db4959b2a762416a62fc95fd06c5b5836189ef6e785cfaaaa2e26e28602a8db2aa71893dd72833490cdf631321ac6c7ab5a168bbf671dfa1bb98ab8c827d3426

    • SSDEEP

      12288:fYVqW8F9057V2WnuYJBcw/6oxYP4Tl9SZZGQ4qS6q:rLs0WnuYP6KeokZZGdqbq

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks