General

  • Target

    570e92efab89182bc75f2b553b28fb954c827d726e6c280a8fe0e8e5acca180a.exe

  • Size

    711KB

  • Sample

    241120-n91s6sxbmk

  • MD5

    d9e1682c252b78fc6c8a9a7746565e66

  • SHA1

    857e5e0ea86ac759b221c223f125a54c70689ee5

  • SHA256

    570e92efab89182bc75f2b553b28fb954c827d726e6c280a8fe0e8e5acca180a

  • SHA512

    5004000dff212609a0db4122a7854ca3cfa4ca83c85d2096e7f8b77d455cb8fc19fb6c3de3173865b7acc7dde8e6bb0b6e04c828be42278b85808224a924192b

  • SSDEEP

    12288:eEEH0GapWzLehoBHUsu4xifZ6R6auv2VLEN714g2OkvqHbFweVC:XEH4pBhtHhm61uLEN7urSbFweQ

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    50.31.176.103
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    HW=f09RQ-BL1

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://50.31.176.103/
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    HW=f09RQ-BL1

Targets

    • Target

      570e92efab89182bc75f2b553b28fb954c827d726e6c280a8fe0e8e5acca180a.exe

    • Size

      711KB

    • MD5

      d9e1682c252b78fc6c8a9a7746565e66

    • SHA1

      857e5e0ea86ac759b221c223f125a54c70689ee5

    • SHA256

      570e92efab89182bc75f2b553b28fb954c827d726e6c280a8fe0e8e5acca180a

    • SHA512

      5004000dff212609a0db4122a7854ca3cfa4ca83c85d2096e7f8b77d455cb8fc19fb6c3de3173865b7acc7dde8e6bb0b6e04c828be42278b85808224a924192b

    • SSDEEP

      12288:eEEH0GapWzLehoBHUsu4xifZ6R6auv2VLEN714g2OkvqHbFweVC:XEH4pBhtHhm61uLEN7urSbFweQ

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks