General

  • Target

    4cdb8cc0837ad94a9b5e246bdef5ef13bf423c6c6dc7b111d0966ef68a81b892_NeikiAnalytics.exe

  • Size

    689KB

  • Sample

    240701-m436nsxgkb

  • MD5

    2f89f3acf9e0cda3475a64a577618ef0

  • SHA1

    64e8d2ce1514ab35101d30f6d316fa2266728722

  • SHA256

    4cdb8cc0837ad94a9b5e246bdef5ef13bf423c6c6dc7b111d0966ef68a81b892

  • SHA512

    fae512a7b4bd514bcd708c871ec5697a1a5f362250d4d377bd03c98592582390ce8e578e2e76dc750c925918fe917de9f165b2457acca73dcdec0e97d4b5e104

  • SSDEEP

    12288:fGp6YuDccm04mfUVXYveOauvtfnB8E7fT3B/oG2hlDLFkzkMKXI:fXYi4m8VrOLtvjfTClDBkzkMKXI

Malware Config

Extracted

Family

snakekeylogger

C2

http://103.130.147.85

Targets

    • Target

      4cdb8cc0837ad94a9b5e246bdef5ef13bf423c6c6dc7b111d0966ef68a81b892_NeikiAnalytics.exe

    • Size

      689KB

    • MD5

      2f89f3acf9e0cda3475a64a577618ef0

    • SHA1

      64e8d2ce1514ab35101d30f6d316fa2266728722

    • SHA256

      4cdb8cc0837ad94a9b5e246bdef5ef13bf423c6c6dc7b111d0966ef68a81b892

    • SHA512

      fae512a7b4bd514bcd708c871ec5697a1a5f362250d4d377bd03c98592582390ce8e578e2e76dc750c925918fe917de9f165b2457acca73dcdec0e97d4b5e104

    • SSDEEP

      12288:fGp6YuDccm04mfUVXYveOauvtfnB8E7fT3B/oG2hlDLFkzkMKXI:fXYi4m8VrOLtvjfTClDBkzkMKXI

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Persistence

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Privilege Escalation

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Email Collection

1
T1114

Tasks