General

  • Target

    Vessel Details.rar

  • Size

    539KB

  • Sample

    250328-shetvazj15

  • MD5

    b05e6e87b9ef97901e04c26f7de7252d

  • SHA1

    a19cf134a3c034be67f05e35c55ca13c7f89354e

  • SHA256

    bfb1c7b5e45c1407c35ce2dc11a2b3376df42e03d5c3e3db30937976d8d68493

  • SHA512

    917d5a84d83e5ffc04707d3574617bdc8b7ec825ed954422d79c5881e37eb504e3194a7f984ab8da933807daf005404d0cb2987a3d3a548770a15780d5b33763

  • SSDEEP

    12288:1pI/DqwkhTiFoGmBghywavgVs19oPFRh6t0reVcfguToPkMg:1pRwkRiFyrwNsEp62reOf5ToPlg

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      Vessel Details.exe

    • Size

      587KB

    • MD5

      2171680ef08db64f0ced805359738f86

    • SHA1

      346302d103cf057ae7b43015a1346ac4a59be939

    • SHA256

      da791f0ba7859d019d5ceaf184f2e64df5311e0179decb82678154c158c7095b

    • SHA512

      ade149a9521065730687453a0196fe716704f10fd246266ec19ba95429be295dbbc24ed21347fb0616c759598b91ea024c1eb60325a3094466310bbee492b26e

    • SSDEEP

      12288:1YmQiKaxG8w2NKgudjntDkkN462b5DDsz7HBLCn2xAkAm3arxx:mmQiE8w2NKgu7K6CsnBLrP3Yx

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks