Resubmissions

29/03/2023, 18:44

230329-xdvfyshd93 10

29/03/2023, 18:37

230329-w9zvwaba9v 10

29/03/2023, 18:28

230329-w4fj2sba7z 10

General

  • Target

    Fatura.lnk

  • Size

    1KB

  • Sample

    230329-w9zvwaba9v

  • MD5

    30b7c40e7d15109c0894baee426f37ab

  • SHA1

    e0e5ee2fc9738953d2f22176c6de38c22fbfc39a

  • SHA256

    4fd98c69b5b4390092b460cf897a0cda23e7ccf4d72607f11dca06e9faa4ac57

  • SHA512

    18ea33405b6b19ab090a7b7c792d75777dfa708ba7bf355a9eec520f69b95e68e1fcdcac2121f9e9ffe6c6b4a9da8262bffcfd122261317dbe3a5d7cade37d04

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://198.46.174.164/118/try.hta

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    citalmet.com.ar
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    payment@123

Targets

    • Target

      Fatura.lnk

    • Size

      1KB

    • MD5

      30b7c40e7d15109c0894baee426f37ab

    • SHA1

      e0e5ee2fc9738953d2f22176c6de38c22fbfc39a

    • SHA256

      4fd98c69b5b4390092b460cf897a0cda23e7ccf4d72607f11dca06e9faa4ac57

    • SHA512

      18ea33405b6b19ab090a7b7c792d75777dfa708ba7bf355a9eec520f69b95e68e1fcdcac2121f9e9ffe6c6b4a9da8262bffcfd122261317dbe3a5d7cade37d04

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks