General

  • Target

    12022025_PI.exe

  • Size

    1.0MB

  • Sample

    250213-lmqctaxjay

  • MD5

    a6b913a8d698ed57a6280e0639c22566

  • SHA1

    485aa43b8350c0636d2e5524d29da8608c8fa2d5

  • SHA256

    b1bd96341b2c06cf1ea7a1a9026222f1a85d8605798be6f7809100b3e0bd11dc

  • SHA512

    1858ebb11af722eccb5548ef08c804bf384a0bbfcc514614a6305c5090af3f20f6db6c29e29b8f8d2fb354e47c74c0fb0887c4be27364e92f991e81888a08146

  • SSDEEP

    12288:yJ7RokodDPTwa5WlVkplFQlNgGYvuQu8E2w2vS644QI3PKyUU2ORkq:1PTs3kp+aGp27JQIEf0

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7304369540:AAEmQe-qbHVPcy-TklKpBW3bMaI29gLAA2g/sendMessage?chat_id=5865543675

Targets

    • Target

      12022025_PI.exe

    • Size

      1.0MB

    • MD5

      a6b913a8d698ed57a6280e0639c22566

    • SHA1

      485aa43b8350c0636d2e5524d29da8608c8fa2d5

    • SHA256

      b1bd96341b2c06cf1ea7a1a9026222f1a85d8605798be6f7809100b3e0bd11dc

    • SHA512

      1858ebb11af722eccb5548ef08c804bf384a0bbfcc514614a6305c5090af3f20f6db6c29e29b8f8d2fb354e47c74c0fb0887c4be27364e92f991e81888a08146

    • SSDEEP

      12288:yJ7RokodDPTwa5WlVkplFQlNgGYvuQu8E2w2vS644QI3PKyUU2ORkq:1PTs3kp+aGp27JQIEf0

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks