General

  • Target

    Purchase Order From Hanon systems Ltd.doc

  • Size

    1.2MB

  • Sample

    210419-57z333bc86

  • MD5

    d9a7f66522882d74a20738f1c3d2681f

  • SHA1

    b5a13dea22b2da04d1147c292f1f8d8ac39d777d

  • SHA256

    777f7cc25c596f6617f5750b2ef83ab0c5b439fac67153224290e83aceca9214

  • SHA512

    74f5ea5ee011c243fed3d94f15382e51e09705ac890767e11954978e5b81d56c2f9d233fb59052d2828516dd50e919355a51af134179ad392bb14f6c43eac916

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    nobettwo.xyz
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    O^1)7]oEv=*a

Targets

    • Target

      Purchase Order From Hanon systems Ltd.doc

    • Size

      1.2MB

    • MD5

      d9a7f66522882d74a20738f1c3d2681f

    • SHA1

      b5a13dea22b2da04d1147c292f1f8d8ac39d777d

    • SHA256

      777f7cc25c596f6617f5750b2ef83ab0c5b439fac67153224290e83aceca9214

    • SHA512

      74f5ea5ee011c243fed3d94f15382e51e09705ac890767e11954978e5b81d56c2f9d233fb59052d2828516dd50e919355a51af134179ad392bb14f6c43eac916

    • Modifies WinLogon for persistence

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger Payload

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Exploitation for Client Execution

1
T1203

Persistence

Winlogon Helper DLL

1
T1004

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks