General

  • Target

    1007b9ca338ee5413f2f9eee4eee6f52ed2a0c44d84276b1d5fbfc5fe2124969

  • Size

    784KB

  • Sample

    250218-dc2zvswner

  • MD5

    bfb2deffd989acf1b174e60de7c84884

  • SHA1

    c8985d5dd77484902e04d56367b1cbc5ecb9ffc6

  • SHA256

    1007b9ca338ee5413f2f9eee4eee6f52ed2a0c44d84276b1d5fbfc5fe2124969

  • SHA512

    7cd0057a3ba85ac62cc227f2bd6756b42fb356f19545e2f354986bbe0a578fb97a65714281f6d63d9b106921ea59f7d98bb8c59b724781bf33a1cfc9b2544af0

  • SSDEEP

    24576:Mnn2ygT7yZQTO32HyfZXJJLnkv4LCIbLes93LtA:BDT7gcyfZXJJTkv4tb3xA

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7891452286:AAE2oLBQvjY6qRrkalPPxinaMdSDDJEY_C8/sendMessage?chat_id=7225431807

Targets

    • Target

      New Purchase Order.exe

    • Size

      886KB

    • MD5

      762df27b4f94d6df4e6530b55fd1a8d5

    • SHA1

      62d1f3ad9b1f7b589eb6b0b55da548e91c794fbc

    • SHA256

      db52ee4039b781a52a7a3708ec7cad8c745d5c5ee41505ec05dae7fbf662f121

    • SHA512

      35f041e4d131d213882ae2a2556fa319299e67d1c4efd0e46076e0df49ed0e78c09b09d6874de6889f3573c3df7a2ca4696a30832d385512989bb4be4737a5c1

    • SSDEEP

      24576:ZqLeA2+ET7p2Ni32HI9jXjNDqTO6FIN453L/:NVTBcI9jXjNDR+IN2

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks