General

  • Target

    beenieT.exe

  • Size

    627KB

  • Sample

    250218-pwj4ya1pz7

  • MD5

    01adfbc94da06851348026ba175876f4

  • SHA1

    afab7627513aeab150cb27609e2ee3ddf3062c8e

  • SHA256

    027704a79bc8bc9533c0d2d20c15ff824be56a280512e2305ac66dea22e91f70

  • SHA512

    93dc93dcd9d87afc731258aaedb999776dcbe5421116f9ad71dae54f9ec8ccfaca02c80a212a04d16391f4ed6530b5f46c4554ada935d940b0f2fe163a174771

  • SSDEEP

    12288:6xgmXcBFdytRXdvtaFFPiYK41HU/iZqRNyVTZlqPxUN6Kk+ycR/3w2FirEukR:uZAFQnmFPiYKJZNcTipUNrk/92Qk

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7465931215:AAEEB2buL-YODXHMy33u4S1TgD90QPF6Te0/sendMessage?chat_id=7519150590

Targets

    • Target

      beenieT.exe

    • Size

      627KB

    • MD5

      01adfbc94da06851348026ba175876f4

    • SHA1

      afab7627513aeab150cb27609e2ee3ddf3062c8e

    • SHA256

      027704a79bc8bc9533c0d2d20c15ff824be56a280512e2305ac66dea22e91f70

    • SHA512

      93dc93dcd9d87afc731258aaedb999776dcbe5421116f9ad71dae54f9ec8ccfaca02c80a212a04d16391f4ed6530b5f46c4554ada935d940b0f2fe163a174771

    • SSDEEP

      12288:6xgmXcBFdytRXdvtaFFPiYK41HU/iZqRNyVTZlqPxUN6Kk+ycR/3w2FirEukR:uZAFQnmFPiYKJZNcTipUNrk/92Qk

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks