General

  • Target

    proforma invoice No. 42037,pdf.exe

  • Size

    31KB

  • Sample

    210505-8c3gkqakp6

  • MD5

    1fc85b87347785b556af1d0f47a1f928

  • SHA1

    c39c80b549f7dc46bfe18d5b956a4a17b28bac78

  • SHA256

    a3ef4500e9f5f2447d55de102e2529a62b48f644b03d22199ce5c69c0ca57c88

  • SHA512

    2c13b8f8e8845ed9ad2c5718a1fdbe16da06106b54cca04d8f978c0d15c1af8e90b900900e4b1c325e995ef5799101eee9edc182fc17c92dc33ecab478ac490c

Malware Config

Extracted

Family

oski

C2

203.159.80.72

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot1761516426:AAE3Juu_v6fG9Gy1S33LdTvyz85ua-duZsk/sendMessage?chat_id=1727399585

Targets

    • Target

      proforma invoice No. 42037,pdf.exe

    • Size

      31KB

    • MD5

      1fc85b87347785b556af1d0f47a1f928

    • SHA1

      c39c80b549f7dc46bfe18d5b956a4a17b28bac78

    • SHA256

      a3ef4500e9f5f2447d55de102e2529a62b48f644b03d22199ce5c69c0ca57c88

    • SHA512

      2c13b8f8e8845ed9ad2c5718a1fdbe16da06106b54cca04d8f978c0d15c1af8e90b900900e4b1c325e995ef5799101eee9edc182fc17c92dc33ecab478ac490c

    • Oski

      Oski is an infostealer targeting browser data, crypto wallets.

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger Payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

4
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

4
T1005

Tasks