General

  • Target

    IMG_80137.doc

  • Size

    697KB

  • Sample

    210119-rfa7fzybte

  • MD5

    2b7551d6acbc85a01665c85fe7a36f74

  • SHA1

    d3494c2ac5ef725385a79b86efd50d8b5026162a

  • SHA256

    164038eb5d5da7528a63666473b56bdc4550e624feacc22d33ccac2857b3a1a6

  • SHA512

    a7c1127b00f8dad23793d88af4e841c58098987c2cdefe529581333ecd7b14faac90b5fafbb13b4958b4c7e29908f6d1b5ee68de35d085323b89c3e39615f069

Malware Config

Targets

    • Target

      IMG_80137.doc

    • Size

      697KB

    • MD5

      2b7551d6acbc85a01665c85fe7a36f74

    • SHA1

      d3494c2ac5ef725385a79b86efd50d8b5026162a

    • SHA256

      164038eb5d5da7528a63666473b56bdc4550e624feacc22d33ccac2857b3a1a6

    • SHA512

      a7c1127b00f8dad23793d88af4e841c58098987c2cdefe529581333ecd7b14faac90b5fafbb13b4958b4c7e29908f6d1b5ee68de35d085323b89c3e39615f069

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger Payload

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Exploitation for Client Execution

1
T1203

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Tasks