General

  • Target

    64ac5a54b0716963fe7b8c608275a993a61a45516e8451e78d874d2c5f449798

  • Size

    482KB

  • Sample

    241209-a1ebxs1pgm

  • MD5

    ffe737328f0138812eeee47d19faf301

  • SHA1

    3f2a90fa0422c342e7ab7590385d65dbb4d0641c

  • SHA256

    64ac5a54b0716963fe7b8c608275a993a61a45516e8451e78d874d2c5f449798

  • SHA512

    b35d959c7feaf7de5db492cce01da6819c0086e82cec6abcb45717568f7c83ab514fec94134e120e2f7adafa39029fec03a4f77b818ad81ebd0c003e5ebb8859

  • SSDEEP

    12288:wpjoWFvY3S3CMxw18uvi/68traMn5inENPb0wYSkmH2R1kbarSDy:8joWFvYYCxCuK/6Q52coY2wGN

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      QUOTATION#00870.exe

    • Size

      489KB

    • MD5

      bcaf6fb2575efdf1334df47b0cb72622

    • SHA1

      9cb5f2577cc721010eba85f06ecae540a6ddf46d

    • SHA256

      5a9a4bb850b87e2e12608197e67e9f25cb2d85f802739f5d223407e10d658568

    • SHA512

      353a9c4eecee8b99ec35863549a13fcaff73b8d95f6c592b1f4b356d06d67fa08466c58d3a86840615d3e3dc302d57ffebe2ae73fbe105ddaefc0aa758f94979

    • SSDEEP

      12288:9roPi5P5h+KFiYudUZ0Gq8lucLcDil+s39Wo3y7NUYEUQyTzK8b6E8aFAA12:BoPizYyV0ncLsil+s39Wo6NUYhBTXb6p

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • UAC bypass

    • Windows security bypass

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Windows security modification

    • Accesses Microsoft Outlook profiles

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks