General

  • Target

    556e3ac094f5a67d4c83ea8e3bc0d7d79fd5dad5c780f8c0bf250f3f2e724840N.exe

  • Size

    616KB

  • Sample

    241129-zcn9navmhw

  • MD5

    f8f2501baf692811e11cf4b2052ab130

  • SHA1

    6532119171d6f368a3efb434b02c429edf02aef7

  • SHA256

    556e3ac094f5a67d4c83ea8e3bc0d7d79fd5dad5c780f8c0bf250f3f2e724840

  • SHA512

    b2f4bbb320b51854cf28950c0d6c11198816451143cbe45252f68c98d64af07ddc9a5df6ae3508bdc903b5583dd0471f8ccfcaf02bd7ae0cbdbe6c7570495efc

  • SSDEEP

    12288:aCb+eCSmG8LVc+xH1UYjGy1w3wbgCP/BJqZJhOjSMoQRVxoUMQZkR:jCY+W+r9lBJs+xoFj

Malware Config

Targets

    • Target

      556e3ac094f5a67d4c83ea8e3bc0d7d79fd5dad5c780f8c0bf250f3f2e724840N.exe

    • Size

      616KB

    • MD5

      f8f2501baf692811e11cf4b2052ab130

    • SHA1

      6532119171d6f368a3efb434b02c429edf02aef7

    • SHA256

      556e3ac094f5a67d4c83ea8e3bc0d7d79fd5dad5c780f8c0bf250f3f2e724840

    • SHA512

      b2f4bbb320b51854cf28950c0d6c11198816451143cbe45252f68c98d64af07ddc9a5df6ae3508bdc903b5583dd0471f8ccfcaf02bd7ae0cbdbe6c7570495efc

    • SSDEEP

      12288:aCb+eCSmG8LVc+xH1UYjGy1w3wbgCP/BJqZJhOjSMoQRVxoUMQZkR:jCY+W+r9lBJs+xoFj

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks