General

  • Target

    RFQ MR 27138.xls

  • Size

    1.0MB

  • Sample

    221125-htsjzadb9x

  • MD5

    768b4fdf9eb74f35ccc942f5d7781eef

  • SHA1

    12831b407cd266ae56b2884a94b35ecf6503ccda

  • SHA256

    a579d0b705185f55e7fa599681d06601ed89468ed46160d631b54fefb1706ac2

  • SHA512

    b0b88e4419313fff32fc53b0ae4b2dfa0e1c90a28a3a2ccb8188becc66f38b7c7e8a271bc22475f2f9bc5280f33722299531474f683b9268534abfe81cb7b47b

  • SSDEEP

    24576:kr5XXXXXXXXXXXXUXXXXXXXSXXXXXXXXVmZr5XXXXXXXXXXXXUXXXXXXXSXXXXXd:F

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      RFQ MR 27138.xls

    • Size

      1.0MB

    • MD5

      768b4fdf9eb74f35ccc942f5d7781eef

    • SHA1

      12831b407cd266ae56b2884a94b35ecf6503ccda

    • SHA256

      a579d0b705185f55e7fa599681d06601ed89468ed46160d631b54fefb1706ac2

    • SHA512

      b0b88e4419313fff32fc53b0ae4b2dfa0e1c90a28a3a2ccb8188becc66f38b7c7e8a271bc22475f2f9bc5280f33722299531474f683b9268534abfe81cb7b47b

    • SSDEEP

      24576:kr5XXXXXXXXXXXXUXXXXXXXSXXXXXXXXVmZr5XXXXXXXXXXXXUXXXXXXXSXXXXXd:F

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Tasks