General

  • Target

    9ca57fad774580d0ffd923ffd950622307518ca28863b3a4ea8710e9aae9a1fb.exe

  • Size

    423KB

  • Sample

    241121-bvssssxbph

  • MD5

    174ae4a50df47667169fd557ef800b68

  • SHA1

    913294e1535874dc2d22049a009fa295179b9052

  • SHA256

    9ca57fad774580d0ffd923ffd950622307518ca28863b3a4ea8710e9aae9a1fb

  • SHA512

    9f5fb54b1ba10a174166a78f985291530e7b009fc31810874d1d358d94ef887e1d46dab08c6c688a24b1cdcedcb1b5ccbbac043c604af9788159a61974ca6e37

  • SSDEEP

    6144:NXHYL6Uqd2GhNup+DFCHlKSEkvcZdCtP+t82ANozL2M81zj4xJ0I3:VYuUi2iNRCkSEkvcZwPBoPW1QxJh

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      9ca57fad774580d0ffd923ffd950622307518ca28863b3a4ea8710e9aae9a1fb.exe

    • Size

      423KB

    • MD5

      174ae4a50df47667169fd557ef800b68

    • SHA1

      913294e1535874dc2d22049a009fa295179b9052

    • SHA256

      9ca57fad774580d0ffd923ffd950622307518ca28863b3a4ea8710e9aae9a1fb

    • SHA512

      9f5fb54b1ba10a174166a78f985291530e7b009fc31810874d1d358d94ef887e1d46dab08c6c688a24b1cdcedcb1b5ccbbac043c604af9788159a61974ca6e37

    • SSDEEP

      6144:NXHYL6Uqd2GhNup+DFCHlKSEkvcZdCtP+t82ANozL2M81zj4xJ0I3:VYuUi2iNRCkSEkvcZwPBoPW1QxJh

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Looks for VirtualBox Guest Additions in registry

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks