General

  • Target

    de9e447ac18100ef9696307210d5de75744aaa34f346c0b3bb894f7e4fff92c7.exe

  • Size

    513KB

  • Sample

    241205-s9xtqs1lbw

  • MD5

    f747bd84ca6e30d0f6c82363613df40b

  • SHA1

    c50a288da4d21ee75622bd30fc3a2fa69a488e8c

  • SHA256

    de9e447ac18100ef9696307210d5de75744aaa34f346c0b3bb894f7e4fff92c7

  • SHA512

    d33b0b4c46cf265584104876607a59374eab4e38e82b213a1852e47c22fc25ef378d57d933586eb0f8bbd3fcdb4e26e2d8c0d89beb696f16f49256675dcdb872

  • SSDEEP

    6144:8eEKVOJIA7ezJbjWSECMLYmPxjzkoz9btOvDeF/4erMBx6taEga4X2q/uXR8Yx5j:bUSFbjp4zxoferaKih4RzycBIyp

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.murchisonspice.co.za
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    orders786q#

Targets

    • Target

      de9e447ac18100ef9696307210d5de75744aaa34f346c0b3bb894f7e4fff92c7.exe

    • Size

      513KB

    • MD5

      f747bd84ca6e30d0f6c82363613df40b

    • SHA1

      c50a288da4d21ee75622bd30fc3a2fa69a488e8c

    • SHA256

      de9e447ac18100ef9696307210d5de75744aaa34f346c0b3bb894f7e4fff92c7

    • SHA512

      d33b0b4c46cf265584104876607a59374eab4e38e82b213a1852e47c22fc25ef378d57d933586eb0f8bbd3fcdb4e26e2d8c0d89beb696f16f49256675dcdb872

    • SSDEEP

      6144:8eEKVOJIA7ezJbjWSECMLYmPxjzkoz9btOvDeF/4erMBx6taEga4X2q/uXR8Yx5j:bUSFbjp4zxoferaKih4RzycBIyp

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks