General

  • Target

    31012025_0150_DTWPPP90000.bat.zip

  • Size

    599KB

  • Sample

    250131-b882yazjcm

  • MD5

    8b32dc818487abbab94f5d30918a6a91

  • SHA1

    6a9e1ffaa53f8cbdeae9d852ce08911f9ac04648

  • SHA256

    6a0b1653f6529f6c47cefe7d870d81891570dade76cc4e9c9ac73f53f0cf7dab

  • SHA512

    2413cae4cb921083c0c7914fe51dd1ad185d679dc110cf3a3116a04b3f6bc38400fa73a55dce05c381cc323eecf105898e1ec30f912039067bcb5e3abe173f7e

  • SSDEEP

    12288:3RURCMeNozkWw76CVUKWHXPnhyFKOvVnl79/ldYikI3WVimYCKQ:39QYGCCBXPnhyUOtl79sik4WV/YdQ

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7339564661:AAFzTB6gEWMndjXYyD5LCn17UEBISRR8wDI/sendMessage?chat_id=6443825857

Targets

    • Target

      DTWPPP90000.bat

    • Size

      674KB

    • MD5

      2ad9b003804bf466bbc840e9cf1267df

    • SHA1

      b8a3fd0311eb5f1161b896d9df7b39917afd54b7

    • SHA256

      9a5289cd4d6c3ebe781e5093c7be2ad9cab9f3dd896fe65484199bf690219ff3

    • SHA512

      8293c50eeac70a55b4d0fb3a6ac324f61cda5138cff2d641bb70e9448163dc7bc83c71d2289f5f296888494cda37ef293a3840856f91b957ece2b6d5c3144873

    • SSDEEP

      12288:U4GQ6Fy1mHR/mC9awDws/lxyRpeUGWHXZnXyFOsLVnVB3PlXYiwI3cVEOMtjIh:H36Y1moC9aS/XopDNXZnXy0spVB3yiwp

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks