General

  • Target

    PO.doc

  • Size

    39KB

  • Sample

    230208-w9hatsec94

  • MD5

    7bef0db4752cfa72fa2a6b803399b404

  • SHA1

    e54ad9a8b00581c8523dfca5230878d72a84243f

  • SHA256

    47be618f3bc464769ed523f82df8383dfdd60f6c713c1662fbc5b57a068223c5

  • SHA512

    fc3609c5bbdac032f152aafd87369f58dffa549831d25d6a306ed5bef8feaf10d1325c6586b5665de6d1a27919954526054dd617b9b6f2e5d391d1b69e904f26

  • SSDEEP

    768:nFx0XaIsnPRIa4fwJMgD4mkPpqI89JyAJnAudW4jN0g5+8A23Py:nf0Xvx3EMQCSJDJnA54JjAP

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      PO.doc

    • Size

      39KB

    • MD5

      7bef0db4752cfa72fa2a6b803399b404

    • SHA1

      e54ad9a8b00581c8523dfca5230878d72a84243f

    • SHA256

      47be618f3bc464769ed523f82df8383dfdd60f6c713c1662fbc5b57a068223c5

    • SHA512

      fc3609c5bbdac032f152aafd87369f58dffa549831d25d6a306ed5bef8feaf10d1325c6586b5665de6d1a27919954526054dd617b9b6f2e5d391d1b69e904f26

    • SSDEEP

      768:nFx0XaIsnPRIa4fwJMgD4mkPpqI89JyAJnAudW4jN0g5+8A23Py:nf0Xvx3EMQCSJDJnA54JjAP

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks