General

  • Target

    db4c9f78490f0152cd750980db402d610c42157e240faf1287d84ad3e5d9026b

  • Size

    525KB

  • Sample

    250122-fdxgwazlaj

  • MD5

    9a3b83590f7ebc979c46a2aafaf2f9a9

  • SHA1

    92fad03448c21c20d434a79966d893648ce84875

  • SHA256

    db4c9f78490f0152cd750980db402d610c42157e240faf1287d84ad3e5d9026b

  • SHA512

    cb6a1a5107367e0917bd5d18a5b12febade79a2252b23d7565120fd547f4aaa1174f066454663f964ced4a5a14bd3e1a71a521a1eefcbcc3be353b46d6580867

  • SSDEEP

    12288:kSb9s5BGj/xAZlBxlDhjRL3TKgKaqJIM7mpFbcHvB7kc2mk5:b9o8j/xArB3FjRL32gKXmpc1v2m4

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7810622048:AAGlXVtU9EeAX6sumC63y05EJISEAmugavs/sendMessage?chat_id=986310232

Targets

    • Target

      Purchase Order 194960.exe

    • Size

      625KB

    • MD5

      92514a6ef5868dd0dbba559a12ccb68c

    • SHA1

      9dbacede171405c46debfe2cc40128ddc731103b

    • SHA256

      862a46281deaadf07f5ce4d2e40efef9949326a8e5622cf2d412ec962a833195

    • SHA512

      e8a6a09488a4c59bb317c6d166d4a8aa69e4e5dc012dd88de8b5e4688b97f5039ad0189e4e0a2c28de4e0bac1ed0b1e0c90e9f1a49bdb588cfa84a6427ab733a

    • SSDEEP

      12288:7nLHWa+ka4ZQhiSaHOMMv0VCwpGpF4aOMbjfAJ7/R8nZrfvxrs7oQBXe:4kmhAHgsgaGpEMbjC7/R8nZrfwoQk

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks