General

  • Target

    Purchase Order (Ref M050417).docx

  • Size

    169KB

  • Sample

    220524-xs71laaafn

  • MD5

    f3507e52fb0692a6fbac4afdc60b0f84

  • SHA1

    11ecc242faa42035b8a98e564b6a93eeaaf15338

  • SHA256

    21dcb10cb40e5357959aaed507513d8e04e72ba0e348c91288beeb8a00340c42

  • SHA512

    8f67a97360b12fc2cdd3bf0f24becc3c39719de58c93a52de47916a9a86445ab5ffb672d06f7be95604034aa3e0861bfa6f1a6a2f7a151179b46722a86716e67

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://www.mediafire.com/file/66qmupxl6a3kglz/12.dll/file

Extracted

Family

arkei

Botnet

Default

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://103.153.77.98/
  • Port:
    21
  • Username:
    jfhgjuere12
  • Password:
    hdhddjhfu1299

Targets

    • Target

      Purchase Order (Ref M050417).docx

    • Size

      169KB

    • MD5

      f3507e52fb0692a6fbac4afdc60b0f84

    • SHA1

      11ecc242faa42035b8a98e564b6a93eeaaf15338

    • SHA256

      21dcb10cb40e5357959aaed507513d8e04e72ba0e348c91288beeb8a00340c42

    • SHA512

      8f67a97360b12fc2cdd3bf0f24becc3c39719de58c93a52de47916a9a86445ab5ffb672d06f7be95604034aa3e0861bfa6f1a6a2f7a151179b46722a86716e67

    • Arkei

      Arkei is an infostealer written in C++.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger Payload

    • suricata: ET MALWARE Generic gate .php GET with minimal headers

      suricata: ET MALWARE Generic gate .php GET with minimal headers

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks