General

  • Target

    d1aca1896611f99b17a4a164393fa5decac29abbb3be0cd55e79587e703daf7d.exe

  • Size

    548KB

  • Sample

    241120-j3135symgj

  • MD5

    b7ae929645f84ccef7b887d7d5c69b59

  • SHA1

    04495d161d24102317fe4ea444bae295d4a459ff

  • SHA256

    d1aca1896611f99b17a4a164393fa5decac29abbb3be0cd55e79587e703daf7d

  • SHA512

    2b13e8774cda99e1641a6cc143018cc7084847dfce047ac9c05d4e5bf60a8f7945d0dad93397c45a0223d4933f502b03ae8b84135b7680012cefd01bf6485036

  • SSDEEP

    12288:HD7go7VIG3k0MOdkrUC85KbIvXP5LWNSRwHbn+EgXkCkygA:HDEo7V/F5daB5bIvf5LiHb+xkCknA

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    50.31.176.103
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    #MT#mn!6V!@6

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://50.31.176.103/
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    #MT#mn!6V!@6

Targets

    • Target

      d1aca1896611f99b17a4a164393fa5decac29abbb3be0cd55e79587e703daf7d.exe

    • Size

      548KB

    • MD5

      b7ae929645f84ccef7b887d7d5c69b59

    • SHA1

      04495d161d24102317fe4ea444bae295d4a459ff

    • SHA256

      d1aca1896611f99b17a4a164393fa5decac29abbb3be0cd55e79587e703daf7d

    • SHA512

      2b13e8774cda99e1641a6cc143018cc7084847dfce047ac9c05d4e5bf60a8f7945d0dad93397c45a0223d4933f502b03ae8b84135b7680012cefd01bf6485036

    • SSDEEP

      12288:HD7go7VIG3k0MOdkrUC85KbIvXP5LWNSRwHbn+EgXkCkygA:HDEo7V/F5daB5bIvf5LiHb+xkCknA

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks