General

  • Target

    82107247e3738a1675cf511dd4c051fb438dd1a973171318e960b406246fcf93.exe

  • Size

    682KB

  • Sample

    250103-d9gp7a1lfl

  • MD5

    92e84c83303cdc492eaaed0e1e4b79c6

  • SHA1

    ce2f5255abed1a4b241ecdd627f6d247594904ae

  • SHA256

    82107247e3738a1675cf511dd4c051fb438dd1a973171318e960b406246fcf93

  • SHA512

    12edf1453fa0ab19d32a47a0aef36481abe66f5bcb30f68028e6924abcfbd7b0bc87759b36bd6fd978b8ca051b0a6c5e69cd11eae320459eeb3da4f5ea922558

  • SSDEEP

    12288:xIaOq+A8QSkKd5g3yF369jmP6KXbizoJcPw32Awi7BAkR:iar+5g3yB6tOLizoJX

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7822875840:AAE1dEB39_r2yuQHwPOz--iI8ECcmIivnQs/sendMessage?chat_id=7342994424

Targets

    • Target

      82107247e3738a1675cf511dd4c051fb438dd1a973171318e960b406246fcf93.exe

    • Size

      682KB

    • MD5

      92e84c83303cdc492eaaed0e1e4b79c6

    • SHA1

      ce2f5255abed1a4b241ecdd627f6d247594904ae

    • SHA256

      82107247e3738a1675cf511dd4c051fb438dd1a973171318e960b406246fcf93

    • SHA512

      12edf1453fa0ab19d32a47a0aef36481abe66f5bcb30f68028e6924abcfbd7b0bc87759b36bd6fd978b8ca051b0a6c5e69cd11eae320459eeb3da4f5ea922558

    • SSDEEP

      12288:xIaOq+A8QSkKd5g3yF369jmP6KXbizoJcPw32Awi7BAkR:iar+5g3yB6tOLizoJX

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks