General

  • Target

    Swift 52,000USD.xls

  • Size

    503KB

  • Sample

    230207-vkpg6sga4t

  • MD5

    f995ee6cf1282fcd570b490a55b17355

  • SHA1

    e0d2ed2412eb4d09c9a2f05612c01ab93e75af03

  • SHA256

    5589bcfad3eb74dac48659c6353f72b4a3aede02382d92f3180dc895181446d6

  • SHA512

    9f9a0c1b3a5f7e7030a548df35da48721fadce673a1864950e8c9b0488eb5843e4b6aab0e6dd6e682b6359f5484e176300a5a55cbd7bb4d3c37b01f3b1b03d73

  • SSDEEP

    6144:C90rC6zzXaMANkizCBDEk2sG3figF8ESbuQq9c+DS+5T+Z+RwPONXoRjDhIcp0fy:CF935TH8Cuou3y

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    us2.smtp.mailhostbox.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    ^!uJBr^9 daniel

Targets

    • Target

      Swift 52,000USD.xls

    • Size

      503KB

    • MD5

      f995ee6cf1282fcd570b490a55b17355

    • SHA1

      e0d2ed2412eb4d09c9a2f05612c01ab93e75af03

    • SHA256

      5589bcfad3eb74dac48659c6353f72b4a3aede02382d92f3180dc895181446d6

    • SHA512

      9f9a0c1b3a5f7e7030a548df35da48721fadce673a1864950e8c9b0488eb5843e4b6aab0e6dd6e682b6359f5484e176300a5a55cbd7bb4d3c37b01f3b1b03d73

    • SSDEEP

      6144:C90rC6zzXaMANkizCBDEk2sG3figF8ESbuQq9c+DS+5T+Z+RwPONXoRjDhIcp0fy:CF935TH8Cuou3y

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks