General

  • Target

    b3d2c06489759b1433bcf9aa38c9ba9dfb400bbc4ff1deedd960f3c3dd606518.exe

  • Size

    623KB

  • Sample

    250129-dr75esslcm

  • MD5

    6f5a32fe1630cb04f98c3ed07ff9f833

  • SHA1

    76e11f8c97bb63fb915fb1d3143a3b77a643dde2

  • SHA256

    b3d2c06489759b1433bcf9aa38c9ba9dfb400bbc4ff1deedd960f3c3dd606518

  • SHA512

    9a480dd2567d075f624d4254d455ffd70cfaf756cb5a73ae16e9cb25d875743d1f75700dbf042311b37f0a722d9ec6748c431d7714a9fc173afe945d837afc77

  • SSDEEP

    12288:k0dsFt5CffsjpL50fAbpRZrf4S9zxxydAA5QdWeax:i5Cfgpa4zyS1R4

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.murchisonspice.co.za
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    accounts786q#

Targets

    • Target

      b3d2c06489759b1433bcf9aa38c9ba9dfb400bbc4ff1deedd960f3c3dd606518.exe

    • Size

      623KB

    • MD5

      6f5a32fe1630cb04f98c3ed07ff9f833

    • SHA1

      76e11f8c97bb63fb915fb1d3143a3b77a643dde2

    • SHA256

      b3d2c06489759b1433bcf9aa38c9ba9dfb400bbc4ff1deedd960f3c3dd606518

    • SHA512

      9a480dd2567d075f624d4254d455ffd70cfaf756cb5a73ae16e9cb25d875743d1f75700dbf042311b37f0a722d9ec6748c431d7714a9fc173afe945d837afc77

    • SSDEEP

      12288:k0dsFt5CffsjpL50fAbpRZrf4S9zxxydAA5QdWeax:i5Cfgpa4zyS1R4

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks