General

  • Target

    VULKAN PVT RFQ 22122022.exe

  • Size

    245KB

  • Sample

    221223-ep85dafg67

  • MD5

    8001e7c2058163248ce789e2040b87b4

  • SHA1

    e4ae2d2833a211f032dc03aeb723021f7a89a871

  • SHA256

    b3d857405bc06ef7e5822e4d12f5d7128bf50ba6068553ea90db865b35a19a88

  • SHA512

    fd79a916402c201af843d46f626047b174fd1b877453cebb73e0bd99c41256fb03eb5044dbfef8ae114c1bd29ee02f6deaba301209c1cb1af825a0d75902df94

  • SSDEEP

    6144:Lkw81+T2X4FfzdDr7hJXlITJ2EddcHg3UBqaDOwddvmVt:u1+KXorBbXOWnBFXddWt

Malware Config

Targets

    • Target

      VULKAN PVT RFQ 22122022.exe

    • Size

      245KB

    • MD5

      8001e7c2058163248ce789e2040b87b4

    • SHA1

      e4ae2d2833a211f032dc03aeb723021f7a89a871

    • SHA256

      b3d857405bc06ef7e5822e4d12f5d7128bf50ba6068553ea90db865b35a19a88

    • SHA512

      fd79a916402c201af843d46f626047b174fd1b877453cebb73e0bd99c41256fb03eb5044dbfef8ae114c1bd29ee02f6deaba301209c1cb1af825a0d75902df94

    • SSDEEP

      6144:Lkw81+T2X4FfzdDr7hJXlITJ2EddcHg3UBqaDOwddvmVt:u1+KXorBbXOWnBFXddWt

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks