General

  • Target

    products.doc

  • Size

    23KB

  • Sample

    221125-hzzkgadf6y

  • MD5

    ba8da36d2efd359e604bd05b452bc448

  • SHA1

    1fe06747d2a03f8b293b525d31ffcb4de85c6bb7

  • SHA256

    5e12f5142a366cc6500db37936449279fafc38b2048dfa3748be1aa4d422733d

  • SHA512

    074d79ccd64ff11372cdd316e7b7acd66122958a204e0b20c82b4b69966e620d02c7d8e1b4d865c28b5f218a0d643be0fda7f6767b0027736138d872bb4b72fc

  • SSDEEP

    384:rQMmdOFNYY0aaaIswqPeOrka1+fHQJ+t3rQkRhZL6zx+DaJvbcvKfKUyXjloX4j2:xFx0XaIsnPRIa4fwJMV8xKaJvwB9XB5C

Malware Config

Targets

    • Target

      products.doc

    • Size

      23KB

    • MD5

      ba8da36d2efd359e604bd05b452bc448

    • SHA1

      1fe06747d2a03f8b293b525d31ffcb4de85c6bb7

    • SHA256

      5e12f5142a366cc6500db37936449279fafc38b2048dfa3748be1aa4d422733d

    • SHA512

      074d79ccd64ff11372cdd316e7b7acd66122958a204e0b20c82b4b69966e620d02c7d8e1b4d865c28b5f218a0d643be0fda7f6767b0027736138d872bb4b72fc

    • SSDEEP

      384:rQMmdOFNYY0aaaIswqPeOrka1+fHQJ+t3rQkRhZL6zx+DaJvbcvKfKUyXjloX4j2:xFx0XaIsnPRIa4fwJMV8xKaJvwB9XB5C

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks