General

  • Target

    Facturadeproforma.exe

  • Size

    707KB

  • Sample

    241211-r1xxpswqgs

  • MD5

    664a19476de212a8f36e094538f512ed

  • SHA1

    6f41bcca2529af8b929cb0f012ef155750796e08

  • SHA256

    5044d3f1ea725f8e5fc050acc3e662620a97d498739968d35893977ebfe4d039

  • SHA512

    cb764b6fce5681d54aba60d06d2b362c35626b27b31b5e7e77d07aa7334ec75935d6b88e810206524a1bf2877f8b852e1c97202a10d44477a028d021da4c7128

  • SSDEEP

    12288:LgMKhM39TXsTAi18rjXeJGeE/l1n7WRwzbyir78KW9t3zPA7cH:EMaci18rwGeE9dwYbyijW9tDAQ

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7979504653:AAFm_-f-R46w_TvBkt1kfgnnTRSttNIPYiY/sendMessage?chat_id=5600682828

Targets

    • Target

      Facturadeproforma.exe

    • Size

      707KB

    • MD5

      664a19476de212a8f36e094538f512ed

    • SHA1

      6f41bcca2529af8b929cb0f012ef155750796e08

    • SHA256

      5044d3f1ea725f8e5fc050acc3e662620a97d498739968d35893977ebfe4d039

    • SHA512

      cb764b6fce5681d54aba60d06d2b362c35626b27b31b5e7e77d07aa7334ec75935d6b88e810206524a1bf2877f8b852e1c97202a10d44477a028d021da4c7128

    • SSDEEP

      12288:LgMKhM39TXsTAi18rjXeJGeE/l1n7WRwzbyir78KW9t3zPA7cH:EMaci18rwGeE9dwYbyijW9tDAQ

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks