General

  • Target

    e2b79e37d4a34bcab883b0de55809ab1be398fee99cde2fcb0058bac413192f7.exe

  • Size

    520KB

  • Sample

    240703-rqptcasepa

  • MD5

    87c41e117d5bf575fc5bd9dd9386e2aa

  • SHA1

    1ab94afc06ca89c564f43141281051aae9494086

  • SHA256

    e2b79e37d4a34bcab883b0de55809ab1be398fee99cde2fcb0058bac413192f7

  • SHA512

    16c43e53f8d613d18bea8470917f023618d86bde991d175434fd2171f025dfea33901faca8e2667379e81a318cc1db29637bd9880192607d5fea860e3afa29a3

  • SSDEEP

    6144:sTVFZInd6Xcfg9UZndhc7KFCEBbDlRPBUYLvyvvRFBZrrfXB0JaTc0ApziCbI:s5kndmHuxV/JUJDBZrSJaTopzi8I

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.valleycountysar.org
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    DKw(r0%wpbd]
C2

http://103.130.147.85

Targets

    • Target

      e2b79e37d4a34bcab883b0de55809ab1be398fee99cde2fcb0058bac413192f7.exe

    • Size

      520KB

    • MD5

      87c41e117d5bf575fc5bd9dd9386e2aa

    • SHA1

      1ab94afc06ca89c564f43141281051aae9494086

    • SHA256

      e2b79e37d4a34bcab883b0de55809ab1be398fee99cde2fcb0058bac413192f7

    • SHA512

      16c43e53f8d613d18bea8470917f023618d86bde991d175434fd2171f025dfea33901faca8e2667379e81a318cc1db29637bd9880192607d5fea860e3afa29a3

    • SSDEEP

      6144:sTVFZInd6Xcfg9UZndhc7KFCEBbDlRPBUYLvyvvRFBZrrfXB0JaTc0ApziCbI:s5kndmHuxV/JUJDBZrSJaTopzi8I

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks