General

  • Target

    2df3f7d23fd60b25f0e90b1b3f58c49fecf96e0d7b947e421a741511f4625cc5

  • Size

    560KB

  • Sample

    250219-fk6dcsxpal

  • MD5

    0a40757586aa557e45286a66ce0389e8

  • SHA1

    746c3234ff31d04e9b79f0990ba3f2f0535d3afd

  • SHA256

    2df3f7d23fd60b25f0e90b1b3f58c49fecf96e0d7b947e421a741511f4625cc5

  • SHA512

    0a8ad663f21b7bc3ddf5677ddfc5bd2f32f1d5e68a04cf02cbb4e63d17dd4a9d14436897625574f7ca76cfa9aa030cce1cf2685be732ffe65ad801404dccca00

  • SSDEEP

    12288:LZt/JOe4tVrMiAQkJhzsRWevwVMd/R8F0GrAr:dFrWLOsY4wmh+GAe

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5227573794:AAECZBnQSxLs0aOVsV2wnclC6-WKnxPpi_k/sendMessage?chat_id=5217421430

Targets

    • Target

      newwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww.exe

    • Size

      652KB

    • MD5

      a43a4806314ffe1f7c12b70d5e67166d

    • SHA1

      86ff15c0da292046c678c7ca0f1d41da4d7e26a8

    • SHA256

      1d894e62095e10035f72fe5a081a4762247363d1ff9829b1d198cf992d0e04d2

    • SHA512

      1823fbec230799c35ff89dac236cc81947e41aac6fb8c7ccc6bd9c96866d2de14c584baece197ac324c578fb396b52d9ffd4beec6b38e911be3f12b4667d9ab8

    • SSDEEP

      12288:jfTbnb4QzjVHnLM2IQcJhRsX8evMVMj9ocqpsQAHMKZ:33Vtass4MmIyQe

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks