General

  • Target

    88ad296056a6be66969f1e5ce6694398944804a39d8465b42e0af73c5af12cb0.doc

  • Size

    207KB

  • Sample

    240423-tz5bhahg9v

  • MD5

    d90ae35b86323a7495fbd0f89b74ad08

  • SHA1

    a913d6148cbfb3a5be68a34052a4d1ab7d9de989

  • SHA256

    88ad296056a6be66969f1e5ce6694398944804a39d8465b42e0af73c5af12cb0

  • SHA512

    54e720b166c2a2e780c973d4da1b93403e098526cea1ac11a49ef8915eeea7c97faa905b233905d86adb2a0ec7e02ea412eb31608b5634bdd3685f9f183a9e94

  • SSDEEP

    768:sfDwAbZSibMX9gRWjtwAbZSibMX9gRWjtwAbZSibMX9gRWjAFU+Gt8ygBa75ZtaM:OwAlRkwAlRkwAlRPU+G+Xa75ZcqT

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5611396317:AAGsgxx4hwlHZa8kVodTZpCQipWRFwFvBO0/sendMessage?chat_id=5237953097

Targets

    • Target

      88ad296056a6be66969f1e5ce6694398944804a39d8465b42e0af73c5af12cb0.doc

    • Size

      207KB

    • MD5

      d90ae35b86323a7495fbd0f89b74ad08

    • SHA1

      a913d6148cbfb3a5be68a34052a4d1ab7d9de989

    • SHA256

      88ad296056a6be66969f1e5ce6694398944804a39d8465b42e0af73c5af12cb0

    • SHA512

      54e720b166c2a2e780c973d4da1b93403e098526cea1ac11a49ef8915eeea7c97faa905b233905d86adb2a0ec7e02ea412eb31608b5634bdd3685f9f183a9e94

    • SSDEEP

      768:sfDwAbZSibMX9gRWjtwAbZSibMX9gRWjtwAbZSibMX9gRWjAFU+Gt8ygBa75ZtaM:OwAlRkwAlRkwAlRPU+G+Xa75ZcqT

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Exploitation for Client Execution

1
T1203

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

3
T1552

Credentials In Files

3
T1552.001

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Tasks