General

  • Target

    ed1420f9f2247b8c6d968787af2dc71266abd66a282f7103a6525113e3084a59

  • Size

    584KB

  • Sample

    250127-wcpnmszqfr

  • MD5

    b1252ec208fb9065afc44c43da6b258f

  • SHA1

    da465232b8083749cf0c2702c3babe3880cee83a

  • SHA256

    ed1420f9f2247b8c6d968787af2dc71266abd66a282f7103a6525113e3084a59

  • SHA512

    6f5a5206c851585e738c45a8a74112f9d564ef89e3646c0319aa29e2b93b6be821afec71b8c2d2bd5d67457c685a2f6bb6faf52b8086067e20acc1c776cb1ef5

  • SSDEEP

    12288:F/zbniaP9LTnr5FMQbi7SSZ++SGsOwk8pT+UZFvTPsBiOm25UFgcBZT3O5:F/viaPVnr5FMQbi7SSuOwk2dLsNo/BZG

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7979504653:AAFm_-f-R46w_TvBkt1kfgnnTRSttNIPYiY/sendMessage?chat_id=5600682828

Targets

    • Target

      PAGO SWIFT pdf.exe

    • Size

      869KB

    • MD5

      a1279890aeb8abe7f5f043b844c37610

    • SHA1

      f499167373d11cfd9f006e32ba493dea460876cf

    • SHA256

      ac3e59d452c9afd22e61846b9f5d1b475c0fb1e9ee0a890dea660a61280bce57

    • SHA512

      54a0b3563ccb793e1940b2b18989b39e99feee47b4f180d569ded5f8e848f70c18e0e4a1f83ac5dd3250f5852d77138ded558f5ec71e8445456002f9709d111c

    • SSDEEP

      12288:xd0N/PDnN55KQbbjQZEiAGaYwUyNLIUZBvTPEviFZEhmDL1xIrZlXXLRuAUY6IkB:r0BLnN55KQbnQEYwUsDLEIE0D

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks