General

  • Target

    0d7ee783e7fc08d5fff470efa31bf6eff71e9fd81b2f88a45cbce19bd09bd96d

  • Size

    579KB

  • Sample

    241213-vp1q1axjcj

  • MD5

    b189cde29567c470d79cc7b88bb7f166

  • SHA1

    61991e0c44efab03f768ba54160517f693a9addd

  • SHA256

    0d7ee783e7fc08d5fff470efa31bf6eff71e9fd81b2f88a45cbce19bd09bd96d

  • SHA512

    8b798e2085cf353f6096373628de55e8e6bfa4a098b1e50a581cc4c676926876f5c48c2da252a38fd900bec144b146f574b7426ea35ea0f9060344a83181436e

  • SSDEEP

    12288:ZlYqwGpsUpzilsOLxrLSFn9UIDhFWMMLzAGN7K3hY8v/QuTBnw:ZlTwGS3lsfF9UyWZrNwhY83QQnw

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      QUOTATION#08799.exe

    • Size

      643KB

    • MD5

      60ddcafe705a37c0140c4cb0e9c78aad

    • SHA1

      f1027a78300c13ca9628a093452fa86c99dc27e2

    • SHA256

      cc13129324f50af1beb790648588af51cd58745cc19240836104b5441319ecf0

    • SHA512

      4ce31889a8c496c6881520fba3c9caf64323604b9d9d0e45c93282507b7cf60364a36509696b785609e1ba6060001c8ebc4610bd76a0ef105e67136b67539d9c

    • SSDEEP

      12288:numPW57u6MJZLtjsZ3x9iVeWErj59NcW23Sh5UCtjWfXl1Ewu3X3u+:nubKrh0hAVerv59NcWl+vl1g3X39

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • UAC bypass

    • Windows security bypass

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses Microsoft Outlook profiles

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks