General

  • Target

    61f76cde697ec155377ba809d74b60a0346406219d47b3472cc83efc5bc68716.r00

  • Size

    519KB

  • Sample

    241123-c2hrvawlg1

  • MD5

    214b09220339a07fc751c4889922b5dc

  • SHA1

    efa8a39881faf4423be8ed1c8b369c24678e1df2

  • SHA256

    61f76cde697ec155377ba809d74b60a0346406219d47b3472cc83efc5bc68716

  • SHA512

    f6a7fe339f803a1b3c20e7729521546d5481c028d91579677282214b238351a1959150f9824df93a86c130380cc378efa7b2a14354f5fb9ebaa6ce05f022756c

  • SSDEEP

    12288:g+Rj91jDkU2eeysoMoniROl7EJDSMCQLI3+7VzxTuIP2c4SFfSxLSl:g+RjTXkU2ZFonnl7meanTuu2c5NSC

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://cpanel2-nl.thcservers.com/
  • Port:
    21
  • Username:
    Yx74dJ0TP3M=
  • Password:
    Uvob2G1Tc73ZCus02X

Targets

    • Target

      request for quotation.exe

    • Size

      595KB

    • MD5

      4a15ed0feb9e90b56e82c2e45a3b3f5e

    • SHA1

      659661291eb5fd6452d6cabdc24cd9fbc1fb17f7

    • SHA256

      d5d8c33957e90d1caca4b5207d8da5ab1bc4caa9f702abc0ec006d0518ea9aec

    • SHA512

      f5c0e6fd93018b454db12ef76b10a6feeca5d532a7599a6460d00c1870518752fb4ec0bc1052de34e6d4e18e040658d59037a757232f49731264b81c5fe32fed

    • SSDEEP

      12288:VWjK4A9bRiI5VIfzhXLhZnFLsrPmaj015WWn9QNViWeCT+GCqR:AjKRByzhFErOaj0x9uiWeCtCq

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks