General

  • Target

    3cd162fe9f394907e7dae6c4f342f7859d4ea2d645b24a098cd2cb5a877306f8.exe

  • Size

    683KB

  • Sample

    250103-dymgaszram

  • MD5

    7dff0dedcceb56002189a9ce88cf2236

  • SHA1

    7323fe3ec4b682f5d84d353fdec3e66d98e2fefa

  • SHA256

    3cd162fe9f394907e7dae6c4f342f7859d4ea2d645b24a098cd2cb5a877306f8

  • SHA512

    ecac885ca6632a9eea74473ed140711c50d236a057b77f8c39b62db29109d64f74cf2e28a2f671be3ad5cfb1be7c4c81344b364711423df648c203e0e7a49416

  • SSDEEP

    12288:iyhgIaOq+Ab2H/gV0m13PRUnCKo4nTCHw1TwEAbIWNn0hxHrVkR:3aByCKbWHw1EEAkha

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      3cd162fe9f394907e7dae6c4f342f7859d4ea2d645b24a098cd2cb5a877306f8.exe

    • Size

      683KB

    • MD5

      7dff0dedcceb56002189a9ce88cf2236

    • SHA1

      7323fe3ec4b682f5d84d353fdec3e66d98e2fefa

    • SHA256

      3cd162fe9f394907e7dae6c4f342f7859d4ea2d645b24a098cd2cb5a877306f8

    • SHA512

      ecac885ca6632a9eea74473ed140711c50d236a057b77f8c39b62db29109d64f74cf2e28a2f671be3ad5cfb1be7c4c81344b364711423df648c203e0e7a49416

    • SSDEEP

      12288:iyhgIaOq+Ab2H/gV0m13PRUnCKo4nTCHw1TwEAbIWNn0hxHrVkR:3aByCKbWHw1EEAkha

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks