General

  • Target

    DYFRN_file.exe

  • Size

    844KB

  • Sample

    241209-tyrn1stmew

  • MD5

    5e2725e6fc1948c0f8d7044bdbf5218a

  • SHA1

    ab0f3415c6cd7f3ca2a1e935910a4801face7d99

  • SHA256

    e51e7b073e5fa3832455c7e87ccd3bbc7dd1dd3c72cf0bb273f1e24adec6ce92

  • SHA512

    dac35ed58a28d8df099a088a77ca8960e38d4e51a9149d68e96ed8f2bd9fdf0e449f7226fafc004c28e151370a356fe164493470262c1e0cfb87425cf1d2d731

  • SSDEEP

    12288:mUnNezvoYK6g7B/7SDmX6a+xKCOmNOoqwBrMyU+Jiqa/M/kR:1IzLK6g7QSKzxLNOxwZMyUeBFa

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7692220058:AAEny12fSzuKXI7iNJaESECu5UR80nmwLAQ/sendMessage?chat_id=7342994424

Targets

    • Target

      DYFRN_file.exe

    • Size

      844KB

    • MD5

      5e2725e6fc1948c0f8d7044bdbf5218a

    • SHA1

      ab0f3415c6cd7f3ca2a1e935910a4801face7d99

    • SHA256

      e51e7b073e5fa3832455c7e87ccd3bbc7dd1dd3c72cf0bb273f1e24adec6ce92

    • SHA512

      dac35ed58a28d8df099a088a77ca8960e38d4e51a9149d68e96ed8f2bd9fdf0e449f7226fafc004c28e151370a356fe164493470262c1e0cfb87425cf1d2d731

    • SSDEEP

      12288:mUnNezvoYK6g7B/7SDmX6a+xKCOmNOoqwBrMyU+Jiqa/M/kR:1IzLK6g7QSKzxLNOxwZMyUeBFa

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks