General

  • Target

    PM114079-990528.exe

  • Size

    481KB

  • Sample

    240702-bq26ns1enc

  • MD5

    9f259b3c899293bc12c9397e010f9e40

  • SHA1

    af9c1736e4b3fdb69e3e22a70953872257335c89

  • SHA256

    683b3c223e311088d28b4d7ee52e207d8593836887a359a9cdb3b5535f305aa3

  • SHA512

    e12e2ccf1a57b492409c4ce3af237972b11b1b8c126f2b6ad7d56a0b3ef601a226259c5d8706819c95319614a38fa2d2890a62e7f9ce816acf2c445c8529b495

  • SSDEEP

    6144:ZXuAPKbl6eAs+AYJAmp1sWososBPBY0SQBhhASbOF7HAAPq/XtLMfFUYK8tvFCkt:ZXuBxOKkAVzAAylLMfCYK8tv

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    valleycountysar.org
  • Port:
    26
  • Username:
    [email protected]
  • Password:
    fY,FLoadtsiF

Targets

    • Target

      PM114079-990528.exe

    • Size

      481KB

    • MD5

      9f259b3c899293bc12c9397e010f9e40

    • SHA1

      af9c1736e4b3fdb69e3e22a70953872257335c89

    • SHA256

      683b3c223e311088d28b4d7ee52e207d8593836887a359a9cdb3b5535f305aa3

    • SHA512

      e12e2ccf1a57b492409c4ce3af237972b11b1b8c126f2b6ad7d56a0b3ef601a226259c5d8706819c95319614a38fa2d2890a62e7f9ce816acf2c445c8529b495

    • SSDEEP

      6144:ZXuAPKbl6eAs+AYJAmp1sWososBPBY0SQBhhASbOF7HAAPq/XtLMfFUYK8tvFCkt:ZXuBxOKkAVzAAylLMfCYK8tv

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks