General

  • Target

    CHIKWA (2).exe

  • Size

    102KB

  • Sample

    210201-n7vth7tsda

  • MD5

    f9ed1a27fe500e855fb838425b5f70ac

  • SHA1

    a7ed0dcf25f7da103f484840bece749b22d1e1d7

  • SHA256

    4cb618534fc8ab2da4a319613792a5cb456d937e6030a3647fef7666aedaefb6

  • SHA512

    7070502bf6b0f531cc6dc4665f2f95f7f2380a7833e3fabd15e440fab2c9bde32d3e503e82edd4021b1be9303aa770f66e7323d10af627b426d986fa7b88cc6b

Malware Config

Targets

    • Target

      CHIKWA (2).exe

    • Size

      102KB

    • MD5

      f9ed1a27fe500e855fb838425b5f70ac

    • SHA1

      a7ed0dcf25f7da103f484840bece749b22d1e1d7

    • SHA256

      4cb618534fc8ab2da4a319613792a5cb456d937e6030a3647fef7666aedaefb6

    • SHA512

      7070502bf6b0f531cc6dc4665f2f95f7f2380a7833e3fabd15e440fab2c9bde32d3e503e82edd4021b1be9303aa770f66e7323d10af627b426d986fa7b88cc6b

    • Modifies WinLogon for persistence

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger Payload

    • Drops startup file

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Tasks