General

  • Target

    0b0bc627174936754635fa610c0faf593069b53a7c41af065d98932b0f50f40d

  • Size

    570KB

  • Sample

    250211-jmtdcszpfl

  • MD5

    7d4df7421b68a726f22a78b13886500f

  • SHA1

    0030ff27a1a379199bb1d87068e7308877bda541

  • SHA256

    0b0bc627174936754635fa610c0faf593069b53a7c41af065d98932b0f50f40d

  • SHA512

    83a60bae857b171e476f895d88d32937ad69511c5febe1ad0882559c6e15db2ea12aad72231c248d1e4001b14053f4cebbdca6079ebd9f5e2a4680b7b2e1c1af

  • SSDEEP

    12288:sFyPzWVfiIeMEfFO2bprJdChdrVI52KghI28+CIC/iCMyKpf7dT:sFy7WVKIejFF5GdxI52KgbpChtleDF

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7810622048:AAGlXVtU9EeAX6sumC63y05EJISEAmugavs/sendMessage?chat_id=986310232

Targets

    • Target

      Remittance Advice Copy.exe

    • Size

      717KB

    • MD5

      580bd2a41500f5ccffe367121c09d832

    • SHA1

      442e85bda43d4c16e188721a55242395693f46de

    • SHA256

      17f1ed61991cf8d7e900a14a98716a989389631cbb1339b8bc932f7265747e9c

    • SHA512

      4d73bee25441304e9a5fdfd7a69411520adf8b8dc511194d170a15b74bb1140131fae3268be88b99591402eedad7d64b23c6a2ddf390178f87e8f6fe0c73cd73

    • SSDEEP

      12288:i3FN3ZHXV3ybD8wBhdQI3mib6Jowrelqc/Z9GVOZaM7S2eyrPvpT2lPK7JS:i3v3ybDpl31bKrelLgn2ZN2BK

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks