General

  • Target

    proforma Invoice.pdf.z

  • Size

    921KB

  • Sample

    230607-pncd5aad66

  • MD5

    1e25aa999c0fa54f44e6f61f5ecabf90

  • SHA1

    9120f0b597f035d267ef7b8ead73a178612699e8

  • SHA256

    38a40add079a4dfbaf33406c9fb38ed051c98799a9f100444a291bbe2e483827

  • SHA512

    7a83da7aa6f8ffc8f2c39193b4594b855ac57568ba3125cb018fba7dca3ae63dbb5f934ba44c9b1736c8ad352aaf2c79f594d927fcab1838b68beed99c57512c

  • SSDEEP

    24576:roZFSBkrAEWY53Yf9jfPML2AtKOWacbVXCi6:roiSH3Yf9j2tKOWacbwi6

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6288005341:AAGRgYv2o5lUGc3tnZ9QIy4L5Vg9lraTrSs/sendMessage?chat_id=6121807451

Targets

    • Target

      proforma Invoice.exe

    • Size

      1002KB

    • MD5

      519a4362bd2e58ed1dc658ea0b4c2b34

    • SHA1

      21ab5eba93ba582c75cd2966114fd4424c61af03

    • SHA256

      1174a36a1437a563b6d80ea0ace862adecdbd91817bee7e845cbaac144e02df6

    • SHA512

      28c030a67b8292815dbc307f7126e343e87721dbb80a79655ff4e5af275b7589fca3d2ab18e90f3e5ea8d82cc2fd21d919cb723f20603897c520a50f86eb4adc

    • SSDEEP

      24576:g/4URo28cZI5QWvCpEwtmvxk+wSu1purOtYL+:g/QcWQz+wtR+zirtn

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Tasks