General

  • Target

    b00f2a45170a731d423dd77ccad80fdaaab538d52d4f938ad53eca799eba2b23.exe

  • Size

    666KB

  • Sample

    250220-edyt9swkbz

  • MD5

    1dbb57ad5743adcf6646c6bed197a69c

  • SHA1

    25a3c047670712001579460e8567ef7a1bfa5a79

  • SHA256

    b00f2a45170a731d423dd77ccad80fdaaab538d52d4f938ad53eca799eba2b23

  • SHA512

    2d6e97380163bb4b277a4556eb3f73a522494e4a55a29317ecda871eab035de4f9c7e9f022f6b04f116fe76e22257a8a8a229abaf9e5470ce0981dbf3e7f26ca

  • SSDEEP

    12288:piEbnb4wZEtbuVPIloZoCjeYCVnEvqtheNG3SmZkR:drytb6AloH6YQv6Q32

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot8041256307:AAGam3kL48795R3YlIMnfOOfK-_9BlCA7qg/sendMessage?chat_id=2135869667

Targets

    • Target

      b00f2a45170a731d423dd77ccad80fdaaab538d52d4f938ad53eca799eba2b23.exe

    • Size

      666KB

    • MD5

      1dbb57ad5743adcf6646c6bed197a69c

    • SHA1

      25a3c047670712001579460e8567ef7a1bfa5a79

    • SHA256

      b00f2a45170a731d423dd77ccad80fdaaab538d52d4f938ad53eca799eba2b23

    • SHA512

      2d6e97380163bb4b277a4556eb3f73a522494e4a55a29317ecda871eab035de4f9c7e9f022f6b04f116fe76e22257a8a8a229abaf9e5470ce0981dbf3e7f26ca

    • SSDEEP

      12288:piEbnb4wZEtbuVPIloZoCjeYCVnEvqtheNG3SmZkR:drytb6AloH6YQv6Q32

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks