General

  • Target

    Purchase Order_45020.xls

  • Size

    635KB

  • Sample

    240805-nz9ckavfnp

  • MD5

    8bb23c70321a50ccae1047cb639b816e

  • SHA1

    79358c1f386045803c6941fa3f3cf22bf6116876

  • SHA256

    f72e4cc0eef0ec4857e235dd3f92cace525b1edc104feda10ccdbc22ca3609bf

  • SHA512

    a2a698943777a8bfcc9f977eed424ec59f9a2219ab7c073c8a386ca1dad37730fdbd8072dcd56bb2989ecb9115c41ba34bb9f451d92c11f089f50f24a8db242c

  • SSDEEP

    12288:lw+LYINaL66YVYhsxsIWviBk6ZCZuGTyJYCEBeF5hQ+rXonXv6:lLOuVYhWEZuGWjnhVr

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    us2.smtp.mailhostbox.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    yUiavQX8

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      Purchase Order_45020.xls

    • Size

      635KB

    • MD5

      8bb23c70321a50ccae1047cb639b816e

    • SHA1

      79358c1f386045803c6941fa3f3cf22bf6116876

    • SHA256

      f72e4cc0eef0ec4857e235dd3f92cace525b1edc104feda10ccdbc22ca3609bf

    • SHA512

      a2a698943777a8bfcc9f977eed424ec59f9a2219ab7c073c8a386ca1dad37730fdbd8072dcd56bb2989ecb9115c41ba34bb9f451d92c11f089f50f24a8db242c

    • SSDEEP

      12288:lw+LYINaL66YVYhsxsIWviBk6ZCZuGTyJYCEBeF5hQ+rXonXv6:lLOuVYhWEZuGWjnhVr

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Evasion via Device Credential Deployment

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks