General

  • Target

    PURCHASE ORDER#34556558.exe

  • Size

    982KB

  • Sample

    210130-lhwrw92p4s

  • MD5

    98399d488277e522e7f7301e6c0ab58c

  • SHA1

    0cf773171aaced9910591d073edeac8e0db29692

  • SHA256

    e81816b3d339965775f2f4e2dd07e0e036a6cf1260d6967a02fc37b8e3939e25

  • SHA512

    9f4ed91ae82e2edc233e1a941576e73d8d494c082ae105ec1c8c4e72e92940b5f84e103cfb916a213778d973ed4660901dbe9e33694b12f2080d92b8579a4fa2

Malware Config

Targets

    • Target

      PURCHASE ORDER#34556558.exe

    • Size

      982KB

    • MD5

      98399d488277e522e7f7301e6c0ab58c

    • SHA1

      0cf773171aaced9910591d073edeac8e0db29692

    • SHA256

      e81816b3d339965775f2f4e2dd07e0e036a6cf1260d6967a02fc37b8e3939e25

    • SHA512

      9f4ed91ae82e2edc233e1a941576e73d8d494c082ae105ec1c8c4e72e92940b5f84e103cfb916a213778d973ed4660901dbe9e33694b12f2080d92b8579a4fa2

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger Payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates physical storage devices

      Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

2
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks