General

  • Target

    SWF-023204-05130-1512447TIB2200.xlsx

  • Size

    224KB

  • Sample

    220930-mkzddadcd3

  • MD5

    8dc8559bc73d36b6452f7d2c4ec548c7

  • SHA1

    1e3cfb666066c7141aaf122250b877ed1a62803a

  • SHA256

    27435cceb1045a305d063a93aa25cacfbb3658eb15e0abf2edb0d6d23c097f76

  • SHA512

    7219fd8c53d4969c9db18a4c5b0101259f8a41f9c567190e18a8a9eab41ee39f2cf9547966882d87cebe6f1816e9ab92c74b7ca97cd36a3221e177c775fb48bf

  • SSDEEP

    6144:nJKnnZ4VMkhBmpn2aMwDCTtkErlAuHtulE8:4nZYLWn2aM46kklAuN58

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      SWF-023204-05130-1512447TIB2200.xlsx

    • Size

      224KB

    • MD5

      8dc8559bc73d36b6452f7d2c4ec548c7

    • SHA1

      1e3cfb666066c7141aaf122250b877ed1a62803a

    • SHA256

      27435cceb1045a305d063a93aa25cacfbb3658eb15e0abf2edb0d6d23c097f76

    • SHA512

      7219fd8c53d4969c9db18a4c5b0101259f8a41f9c567190e18a8a9eab41ee39f2cf9547966882d87cebe6f1816e9ab92c74b7ca97cd36a3221e177c775fb48bf

    • SSDEEP

      6144:nJKnnZ4VMkhBmpn2aMwDCTtkErlAuHtulE8:4nZYLWn2aM46kklAuN58

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks