General

  • Target

    TRITECH_PO2287.exe

  • Size

    952KB

  • Sample

    221030-vgtbysbhcm

  • MD5

    260b2fb6df12b8cbee97b70aea5d8cc4

  • SHA1

    caa99a5a0567da09f30c6b20369d890b79156c6a

  • SHA256

    c3c94a91dadbc2099ed896f0dab211da9b8262877e1546d86ca68c2ca6744497

  • SHA512

    2eeddcba7dfc386a2a49c4ceb878308f05b9203d6ecc577bd68d45466dbcf1444c3837be5138a0bf4a2fa89af7ae907cbfd814e8a5e311075688822cc03fc66e

  • SSDEEP

    24576:OOA6w+djJ0+Oy7C6ViwaGorX3g39qYQpRH:FA6w+b0+OQC6V7aGob3GqYQpR

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      TRITECH_PO2287.exe

    • Size

      952KB

    • MD5

      260b2fb6df12b8cbee97b70aea5d8cc4

    • SHA1

      caa99a5a0567da09f30c6b20369d890b79156c6a

    • SHA256

      c3c94a91dadbc2099ed896f0dab211da9b8262877e1546d86ca68c2ca6744497

    • SHA512

      2eeddcba7dfc386a2a49c4ceb878308f05b9203d6ecc577bd68d45466dbcf1444c3837be5138a0bf4a2fa89af7ae907cbfd814e8a5e311075688822cc03fc66e

    • SSDEEP

      24576:OOA6w+djJ0+Oy7C6ViwaGorX3g39qYQpRH:FA6w+b0+OQC6V7aGob3GqYQpR

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks