General

  • Target

    ORDEN DE COMPRA.exe

  • Size

    726KB

  • Sample

    250107-r2t77svphs

  • MD5

    e7329b3742fd7bdce97d59aaeb4a51a8

  • SHA1

    96cf01e96d7830d61fe6b78a74e55b4545be514c

  • SHA256

    c1723956299c7dda2a955b4b7b91aeeba07ea9e43f9ce3da6526f7501d9c828d

  • SHA512

    0b5e44b6f9ef9a3595a12ac0901af1acfebc1edf215f3b035ef0304dcc5c426c04e206c4a22eb30fe0bf8c7ce04c94e046225b897bde50f0868cfe4c3e90f8b6

  • SSDEEP

    12288:7XfbMxWYMV+I4MVKWGvkVexuYlcM7u6hbz0I5IXH61eEU+ljaRsTAJy2vK:7Pb6GRgHsVCvlhzhbzQXfEfAs

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7979504653:AAFm_-f-R46w_TvBkt1kfgnnTRSttNIPYiY/sendMessage?chat_id=5600682828

Targets

    • Target

      ORDEN DE COMPRA.exe

    • Size

      726KB

    • MD5

      e7329b3742fd7bdce97d59aaeb4a51a8

    • SHA1

      96cf01e96d7830d61fe6b78a74e55b4545be514c

    • SHA256

      c1723956299c7dda2a955b4b7b91aeeba07ea9e43f9ce3da6526f7501d9c828d

    • SHA512

      0b5e44b6f9ef9a3595a12ac0901af1acfebc1edf215f3b035ef0304dcc5c426c04e206c4a22eb30fe0bf8c7ce04c94e046225b897bde50f0868cfe4c3e90f8b6

    • SSDEEP

      12288:7XfbMxWYMV+I4MVKWGvkVexuYlcM7u6hbz0I5IXH61eEU+ljaRsTAJy2vK:7Pb6GRgHsVCvlhzhbzQXfEfAs

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks