General

  • Target

    INV_PKEX0521219.PDF.z

  • Size

    47KB

  • Sample

    230612-keregaba93

  • MD5

    8447ee4d42df3dfd7ec4f1cb4ec14e7b

  • SHA1

    2541f9e81fb898572c2eecef9fc3a3ff7dc49ed9

  • SHA256

    f8e39bd0a813aea93939649fb467351f3ebc603e08d4a05b5529b922e6cc8abc

  • SHA512

    6135d67ad132acbf2e98c36116ed2bb1a4ed63bb5a4b78d6d06f3e74b04fa281ad56c3e348ef3fca6c4f54241b6a56dab8526687c1d2bae1138808594e3f5728

  • SSDEEP

    768:gCWNn+/PLfISs6oq9ERQEHM+ocrrBoUT3Iu1FB6DVhdgcJZvrNSS+ox83Qz:Swn8R6oq9E1ZVBjT3fcjTl+y8k

Malware Config

Extracted

Family

purecrypter

C2

http://172.245.191.17/000/Gjvbeqdycii.png

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    siamtmc.com
  • Port:
    587
  • Username:
    sompong@siamtmc.com
  • Password:
    s0mp0ng06
  • Email To:
    rufat@nep-az.com

Targets

    • Target

      INV_PKEX0521219.exe

    • Size

      72KB

    • MD5

      f50c01b28f63ea3a2f9eda5d3f62cafc

    • SHA1

      15194fbd3471810bf689da9efeb57efdd4e4f21b

    • SHA256

      0e7012a66e5d3c6ada99f6dcf651fc8a29f31aa74083f76ee96992df0be54ffa

    • SHA512

      98bd8ce28d997815f135b0a73af05cd45d8bdde9d7a018311d7082ee76c3adca78b62ed161fc187febed6037aa556309cfaf13b2a29b1bd65c4a759e8fd5a8f5

    • SSDEEP

      1536:Ua3eJtxKnsYsEMINcTa7FFrj3Pxx1Px90:Ua3ez4sKNykrjfxxpxi

    • PureCrypter

      PureCrypter is a .NET malware loader first seen in early 2021.

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Email Collection

1
T1114

Tasks