General

  • Target

    order6566546663.exe

  • Size

    643KB

  • Sample

    230601-sj3x3afc6x

  • MD5

    8a728a201ff4eebc956d8747c0b689e8

  • SHA1

    94fe365f40c34e83e39a4c81c7cf9319d7cfa6cc

  • SHA256

    0807202daf2095810fdbc78ccf60ed83368e84da1f89d7215f9bac6590b40b7d

  • SHA512

    318b968f5ce9a3caf4a2664bcc6c355463ad78fb65c09cb054ac3fd00e65f7ea454bdb7b9577c6743a01c540eca57b6527708a9008926ae8c10737231ac8511b

  • SSDEEP

    12288:ioEP/SJasDrhUVMJ5kjDZCwbX9PblDCkIcxWMB:A/4pDfGDYuRblDC7cxW

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    argona.ro
  • Port:
    26
  • Username:
    dan.grama@argona.ro
  • Password:
    Argona12!@
  • Email To:
    trainee@valleycountysar.org

Targets

    • Target

      order6566546663.exe

    • Size

      643KB

    • MD5

      8a728a201ff4eebc956d8747c0b689e8

    • SHA1

      94fe365f40c34e83e39a4c81c7cf9319d7cfa6cc

    • SHA256

      0807202daf2095810fdbc78ccf60ed83368e84da1f89d7215f9bac6590b40b7d

    • SHA512

      318b968f5ce9a3caf4a2664bcc6c355463ad78fb65c09cb054ac3fd00e65f7ea454bdb7b9577c6743a01c540eca57b6527708a9008926ae8c10737231ac8511b

    • SSDEEP

      12288:ioEP/SJasDrhUVMJ5kjDZCwbX9PblDCkIcxWMB:A/4pDfGDYuRblDC7cxW

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks