Analysis

  • max time kernel
    401s
  • max time network
    407s
  • platform
    windows7_x64
  • resource
    win7-20220812-es
  • resource tags

    arch:x64arch:x86image:win7-20220812-eslocale:es-esos:windows7-x64systemwindows
  • submitted
    19-09-2022 03:13

General

  • Target

    maldito.exe

  • Size

    126KB

  • MD5

    3a84d66a5dbbc89646cbf7a208501ef6

  • SHA1

    6a422d34b9769188ecc15fc395fb3ab6f0d13593

  • SHA256

    f80489ae836fee55bb01c367514bece083d6ea4d406cb58c9578bc42b7d24977

  • SHA512

    f54723895386284105210b65fce3409d6fe664ec2d32925b646410bb3df1c0992cf8d3a3fa4bd9f6a91a53869cd06780b0583d19573c2cb7b7ed228a2c6e00fc

  • SSDEEP

    1536:BMMPr4n8FsKfXFTw+j5KfT6jQu57Qjlnb/USR+uOF/PpapiOWBoxF0Kcl:BMMPr5sJ+j5KfTAUb8dZKwBoxFbY

Malware Config

Extracted

Family

snakekeylogger

Credentials

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger payload 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\maldito.exe
    "C:\Users\Admin\AppData\Local\Temp\maldito.exe"
    1⤵
    • Accesses Microsoft Outlook profiles
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • outlook_office_path
    • outlook_win_path
    PID:1664

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1664-54-0x0000000000AC0000-0x0000000000AE6000-memory.dmp

    Filesize

    152KB

  • memory/1664-55-0x0000000076CE1000-0x0000000076CE3000-memory.dmp

    Filesize

    8KB