General

  • Target

    04052024_0046_02052024_ORDEN DE COMPRA URGENTE.zip

  • Size

    499KB

  • Sample

    240504-a43tpahb7w

  • MD5

    a8e9c9cbd229df2c91e51bd7aa7a4e04

  • SHA1

    524d170ede0eabcbe52393334dfe619a63240033

  • SHA256

    7a56691185c2b5d61fe9f750dbfb5cdb4c4e3cb0c1867a7ee63afdc202472a93

  • SHA512

    4bd9692ecd8ae730c2873ea719888a7e941343542d1356c94988dd7ac78364b303c087b122ac7447a325ef7106a148d2a10997466a0a2bdbcdbe47ffaca26326

  • SSDEEP

    6144:AI48WQp+VPHQfoQpBsVIJmmLpQ4jBC6NsHucaGhVLEzIIHze7yoT0hRTm0GfZEAq:AI47BHQAbY2gbvQsIIHvoTcTCmAq

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.gbogboro.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Lovelove@123
C2

https://scratchdreams.tk

Targets

    • Target

      ORDEN DE COMPRA URGENTE.exe

    • Size

      511KB

    • MD5

      8463433369d127bc0d6fd650771c0421

    • SHA1

      25d94b622456b5fefab687d83481d61148563137

    • SHA256

      95e987cd2cc805c4d478b31ab1387f5aaa19f9b2ef08f045255554c0031235f5

    • SHA512

      4af7d35d6f3c71138176b2ae58624dfe43caae9bc214d49191d6c9ec6a88f3a2c60a5daea485f7d91282917627d3009cb2125bfbe543507ba04e2a163053ca9b

    • SSDEEP

      6144:IZe/Wqp+HPH+foUpBs7svmcLnQ4pBu6Ni1ic2GV7LELIkHzwbyaP4hTBmO4fCEAR:IU2vH+ABYEUH72wIkHZaPqBMnAR

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • UAC bypass

    • Windows security bypass

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Windows security modification

    • Accesses Microsoft Outlook profiles

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks