General
-
Target
GBE_PO_3000105160.docx
-
Size
212KB
-
Sample
220524-xs71laaafp
-
MD5
5a0187dff6fcc8149b2e9d01e20179fa
-
SHA1
143ad92b2253eb5f23fa22d320844510f5c02834
-
SHA256
e79cbe266df0e4a6a72b6be67d0d0d4dc276ee4559c627a3dfd73dd1859af7f5
-
SHA512
b55c14806876fa155ab086ea3851ad25f876a547c6b045b224b9d6b2c3109a158d9361a3a30c0f8b262b9c3f811fc5736b8100b69fc3a9245bf1de145b23bfd7
Static task
static1
Behavioral task
behavioral1
Sample
GBE_PO_3000105160.docx
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
GBE_PO_3000105160.docx
Resource
win10v2004-20220414-en
Malware Config
Extracted
https://www.mediafire.com/file/2xfbajsftslryfu/3.dll/file
Extracted
Protocol: ftp- Host:
103.153.77.98 - Port:
21 - Username:
bvhffasoo3 - Password:
txcmnxcaspo00
Extracted
arkei
Default
Extracted
snakekeylogger
Protocol: ftp- Host:
ftp://103.153.77.98/ - Port:
21 - Username:
bvhffasoo3 - Password:
txcmnxcaspo00
Targets
-
-
Target
GBE_PO_3000105160.docx
-
Size
212KB
-
MD5
5a0187dff6fcc8149b2e9d01e20179fa
-
SHA1
143ad92b2253eb5f23fa22d320844510f5c02834
-
SHA256
e79cbe266df0e4a6a72b6be67d0d0d4dc276ee4559c627a3dfd73dd1859af7f5
-
SHA512
b55c14806876fa155ab086ea3851ad25f876a547c6b045b224b9d6b2c3109a158d9361a3a30c0f8b262b9c3f811fc5736b8100b69fc3a9245bf1de145b23bfd7
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Snake Keylogger Payload
-
suricata: ET MALWARE Generic gate .php GET with minimal headers
suricata: ET MALWARE Generic gate .php GET with minimal headers
-
suricata: ET MALWARE Trojan Generic - POST To gate.php with no accept headers
suricata: ET MALWARE Trojan Generic - POST To gate.php with no accept headers
-
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
-
suricata: ET MALWARE Win32/Vidar Variant/Mars Stealer CnC Exfil
suricata: ET MALWARE Win32/Vidar Variant/Mars Stealer CnC Exfil
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-