General

  • Target

    d5d8c33957e90d1caca4b5207d8da5ab1bc4caa9f702abc0ec006d0518ea9aec.exe

  • Size

    595KB

  • Sample

    241123-djf1zasqaq

  • MD5

    4a15ed0feb9e90b56e82c2e45a3b3f5e

  • SHA1

    659661291eb5fd6452d6cabdc24cd9fbc1fb17f7

  • SHA256

    d5d8c33957e90d1caca4b5207d8da5ab1bc4caa9f702abc0ec006d0518ea9aec

  • SHA512

    f5c0e6fd93018b454db12ef76b10a6feeca5d532a7599a6460d00c1870518752fb4ec0bc1052de34e6d4e18e040658d59037a757232f49731264b81c5fe32fed

  • SSDEEP

    12288:VWjK4A9bRiI5VIfzhXLhZnFLsrPmaj015WWn9QNViWeCT+GCqR:AjKRByzhFErOaj0x9uiWeCtCq

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://cpanel2-nl.thcservers.com/
  • Port:
    21
  • Username:
    Yx74dJ0TP3M=
  • Password:
    Uvob2G1Tc73ZCus02X

Targets

    • Target

      d5d8c33957e90d1caca4b5207d8da5ab1bc4caa9f702abc0ec006d0518ea9aec.exe

    • Size

      595KB

    • MD5

      4a15ed0feb9e90b56e82c2e45a3b3f5e

    • SHA1

      659661291eb5fd6452d6cabdc24cd9fbc1fb17f7

    • SHA256

      d5d8c33957e90d1caca4b5207d8da5ab1bc4caa9f702abc0ec006d0518ea9aec

    • SHA512

      f5c0e6fd93018b454db12ef76b10a6feeca5d532a7599a6460d00c1870518752fb4ec0bc1052de34e6d4e18e040658d59037a757232f49731264b81c5fe32fed

    • SSDEEP

      12288:VWjK4A9bRiI5VIfzhXLhZnFLsrPmaj015WWn9QNViWeCT+GCqR:AjKRByzhFErOaj0x9uiWeCtCq

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks