General

  • Target

    RFQ-HL51L05- PO#0010202020A&B.exe

  • Size

    329KB

  • Sample

    211018-jaqfyaeagm

  • MD5

    2fbd15a6d2007c2c438c181e952ef389

  • SHA1

    fc0f939e922d18a13c67c7957dd84b486472a82e

  • SHA256

    359aca28cbb86b8055202dd1fe9cc037e16d8863f979e0dd92f2e74056f467f1

  • SHA512

    55ca8374cd971cef30cec5ceb2835112c3b6406038f20cd72373ff74919214722a4988dbca9d6e170b1e7e49d13a8ea4208c9bdbebd16901ace5afe0025e5a9c

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    us2.smtp.mailhostbox.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    iwRaBVG6
C2

https://api.telegram.org/bot2043981125:AAGaa5K6uc5rV5LARENbXhpoD0InPrKgKJI/sendMessage?chat_id=2062013058

Targets

    • Target

      RFQ-HL51L05- PO#0010202020A&B.exe

    • Size

      329KB

    • MD5

      2fbd15a6d2007c2c438c181e952ef389

    • SHA1

      fc0f939e922d18a13c67c7957dd84b486472a82e

    • SHA256

      359aca28cbb86b8055202dd1fe9cc037e16d8863f979e0dd92f2e74056f467f1

    • SHA512

      55ca8374cd971cef30cec5ceb2835112c3b6406038f20cd72373ff74919214722a4988dbca9d6e170b1e7e49d13a8ea4208c9bdbebd16901ace5afe0025e5a9c

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

3
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Tasks