General

  • Target

    30e5e5a39df67a1138bf84db89a5eb47.bin

  • Size

    551KB

  • Sample

    241215-bllccs1qan

  • MD5

    9fb5a31858a1fac11d5eed2908467c3d

  • SHA1

    ef0338ea16cab052c84bcd0cb65bd7a79edda7c1

  • SHA256

    77e17879d1c7e7525ace89c92cd3a60f1aeeeacf5a12abd8d069a0de6f94e662

  • SHA512

    6652782af22585d6e8dcc780a049ffac09c14d50ebdd3a00646a36b1e8f2d0683c9bcfe711a7a036411fb8905c8cb94d89ba0ac158f1d4f9c269aeb4917cff79

  • SSDEEP

    12288:L2QYlJeQqd0qx0SOyBS4j3PMTurYXIZ138kpWRw3XD:L4lJjnqWII4bhYXIZtWRW

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7329625827:AAFusOMtNxAA4AfTt7YzeN1zaE4Sm-WxFiw/sendMessage?chat_id=8096159140

Targets

    • Target

      1d409e94b935c68a4b4841a1b2e05c6abf1ea827c419eab8bf3ee23229574160.exe

    • Size

      625KB

    • MD5

      30e5e5a39df67a1138bf84db89a5eb47

    • SHA1

      d269595a30fd1e49086c51f629e39c15200e0149

    • SHA256

      1d409e94b935c68a4b4841a1b2e05c6abf1ea827c419eab8bf3ee23229574160

    • SHA512

      365324ec484c65e7fb010f1a1fa5b5f97afef3e99d7e16e5ae753fe26da6a62c782196283ec71269a7198e6690de40fcc877f5f7b558a588f4994edfb95fe673

    • SSDEEP

      12288:2dMdY9shQglOUQwZvb6JecS0W/0Wjz3lXsBHxxe70ZjwqmKH2JS:BdhlrQwIJe/bYxiqmm28

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks