General

  • Target

    CHIKWA.exe

  • Size

    35KB

  • Sample

    210120-q6j34fhgs6

  • MD5

    add9b88583e5da86b52a7747ebdff087

  • SHA1

    277ac2d7b74ba414126c187e22ee93bbde025060

  • SHA256

    f53b0fa70af0d73053259d43ea39414707a6472b793d561220aee8b21ceb8436

  • SHA512

    679d8f135473a1d926868528859542d69198e2d62365cb7e7d7b61ba9ba7a82cb2329da04e0308a8b0237f1d63e2674f6bd72b77ad13100f2ea8b5a5e4ec2bce

Malware Config

Targets

    • Target

      CHIKWA.exe

    • Size

      35KB

    • MD5

      add9b88583e5da86b52a7747ebdff087

    • SHA1

      277ac2d7b74ba414126c187e22ee93bbde025060

    • SHA256

      f53b0fa70af0d73053259d43ea39414707a6472b793d561220aee8b21ceb8436

    • SHA512

      679d8f135473a1d926868528859542d69198e2d62365cb7e7d7b61ba9ba7a82cb2329da04e0308a8b0237f1d63e2674f6bd72b77ad13100f2ea8b5a5e4ec2bce

    • Modifies WinLogon for persistence

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger Payload

    • Drops startup file

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Tasks