General

  • Target

    IMG-6661.doc

  • Size

    920KB

  • Sample

    210127-b81s94c5t6

  • MD5

    6aad32d47dc65501a1ff04847f2217c5

  • SHA1

    5b77e900f12c5ecb8500f32363d60b8fbbe6dbbb

  • SHA256

    0174f2ae73de2c6555b520a69b0cc9cb910620252f699854c682bc188ffac4c9

  • SHA512

    f376d2fca836b4cc98cac167c7fd15b8b7a135f9e390d9e7ab4c3659637ff8f3d9cb850b02d42214c789fadb305c2cf2b5f7846ab9806625413002c48eb6301c

Malware Config

Targets

    • Target

      IMG-6661.doc

    • Size

      920KB

    • MD5

      6aad32d47dc65501a1ff04847f2217c5

    • SHA1

      5b77e900f12c5ecb8500f32363d60b8fbbe6dbbb

    • SHA256

      0174f2ae73de2c6555b520a69b0cc9cb910620252f699854c682bc188ffac4c9

    • SHA512

      f376d2fca836b4cc98cac167c7fd15b8b7a135f9e390d9e7ab4c3659637ff8f3d9cb850b02d42214c789fadb305c2cf2b5f7846ab9806625413002c48eb6301c

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger Payload

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates physical storage devices

      Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks