General

  • Target

    FedEx 772584418730.doc

  • Size

    504KB

  • Sample

    210119-h8h37tppva

  • MD5

    7aeebfb82be46c7753fce4382115b326

  • SHA1

    e207226193a25f6eb8011accaed451d9156924ff

  • SHA256

    c527b03caf1b11138845e12a19b81ccdbc2f50f69c52e249d44652050cc30fa1

  • SHA512

    7b509f3b3791b5da8ec1f73c04e72d7c048c6e90df21d3792b4725d3422b30785f8be0e52f35471f271f3b25edddeb6ecf4b81334afd964f8c7964107f53d7eb

Malware Config

Targets

    • Target

      FedEx 772584418730.doc

    • Size

      504KB

    • MD5

      7aeebfb82be46c7753fce4382115b326

    • SHA1

      e207226193a25f6eb8011accaed451d9156924ff

    • SHA256

      c527b03caf1b11138845e12a19b81ccdbc2f50f69c52e249d44652050cc30fa1

    • SHA512

      7b509f3b3791b5da8ec1f73c04e72d7c048c6e90df21d3792b4725d3422b30785f8be0e52f35471f271f3b25edddeb6ecf4b81334afd964f8c7964107f53d7eb

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger Payload

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Exploitation for Client Execution

1
T1203

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks