General

  • Target

    65862f1959ea9d15a1eb9474316a3615d6303722e852c69de59932c6f3411695

  • Size

    562KB

  • Sample

    241210-mb3pfaxrfr

  • MD5

    3f4385463aa753a29d34a8851aed18da

  • SHA1

    4cbe150a5280e8298bd3a5ca9a34c20aabe421bb

  • SHA256

    65862f1959ea9d15a1eb9474316a3615d6303722e852c69de59932c6f3411695

  • SHA512

    5bc5f0a6d7b572348b20be8ab189ff3a5db0645ff8970b3931c3187da6dce3e41bec2645c6885a62e50a655b30425508fcfd29560bb76eebe0c7e688865b27d1

  • SSDEEP

    12288:eFjUDHo8FiZCFh0y23I9FuDdJsVOFRDgjC9914zaIDigKu2R3BGC3Ho:eFj9rZIB249F5YwjCH14zaI2BBxGC3I

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      QUOTATION#08670.exe

    • Size

      811KB

    • MD5

      22a9330757374b6b15f04e37c4ace8e6

    • SHA1

      021e607efad2b2e256c4b3e6e1ad03bcb534a1fe

    • SHA256

      ddfbc9803252f22c7a06d2e1a1fd8617f3e5313cd0493809839aa6907291e7c7

    • SHA512

      6b78603c3b6f600c2f923bc08474e12537945928383901677ca380ce3b3beba3b3d29a67004d36599619d7c7413291b36836dc3952709e7c2da8241650310a87

    • SSDEEP

      12288:/wMiwy9EXX+Rdw0kIQa+eeAoAwnPrGcthicFkgR74u8K8j0AH0+L5iTkR:MwFOlTQateDH7KI7Ba0e5iG

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks