General

  • Target

    119685d67c747bc9fe473e98d4f37f48.bin

  • Size

    310KB

  • Sample

    240703-bdlcdsyfpg

  • MD5

    a1536fb277c288bbca596df3bff4e790

  • SHA1

    8ba56adc016947b3b265028f25e1e0be433d96a5

  • SHA256

    d291952db6688a853ca965a9f5598b7fdeec3d4b56df4c8a1b8d29a186b0b92d

  • SHA512

    87368a1e2f64fb9cdcf59c936b5901c671324e36909ea1acbf73f70c82d1885e1bb7d5901b200afcc866607ec9c0680ad77e0b078e289f8be85ae30842bae9cf

  • SSDEEP

    6144:rryawR1T5hNGD6MAiFfoZnAYFndL652xMlojwGWhS+zN6VlW:fwR1DNGmi+ZAYjf9wU6N6VE

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.valleycountysar.org
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    DKw(r0%wpbd]
C2

http://103.130.147.85

Targets

    • Target

      e80d50169fc57630d4b0c5c53a321ccd86797779bababefff31268224f1a4163.exe

    • Size

      537KB

    • MD5

      119685d67c747bc9fe473e98d4f37f48

    • SHA1

      12523edc262cf3c0e37be13a2aa2e49db7043439

    • SHA256

      e80d50169fc57630d4b0c5c53a321ccd86797779bababefff31268224f1a4163

    • SHA512

      bcf5fd9f4eb4d62529f16afea7315197e1779493646b0c2db9ee4bda7cb965122fa77d80476f07af4b52afe48f18e0b8a1a8f8ea67b6e55b17ccdd2fdd080723

    • SSDEEP

      12288:fn3Kpgo/C7vHH2cJ1JkRA4R06mgJuqsJv/v+MLuSn:vnvHXJkRFRzJ4v/BLB

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks