General

  • Target

    proforma invoice.exe

  • Size

    486KB

  • Sample

    220131-wgbmksaehp

  • MD5

    9c6c327f42df226c0c09561218bb5119

  • SHA1

    2dc652211fdb2b9d0690e6a1d2f692a0c04af2bc

  • SHA256

    aaa1238cff25c9609f089d345d805e5ea580e9e9cddfcdd640e446d0dfa3ad27

  • SHA512

    70449ac67b625f207a33f1231dca0636c5a9f2837d1d8492ddff394d28f301aa79581fb559502b4d908ad3598f8925e491b3f465de467893c195c7ee44a9f4db

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.faks-allied-health.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    $Faks1234

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      proforma invoice.exe

    • Size

      486KB

    • MD5

      9c6c327f42df226c0c09561218bb5119

    • SHA1

      2dc652211fdb2b9d0690e6a1d2f692a0c04af2bc

    • SHA256

      aaa1238cff25c9609f089d345d805e5ea580e9e9cddfcdd640e446d0dfa3ad27

    • SHA512

      70449ac67b625f207a33f1231dca0636c5a9f2837d1d8492ddff394d28f301aa79581fb559502b4d908ad3598f8925e491b3f465de467893c195c7ee44a9f4db

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger Payload

    • Sets service image path in registry

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks