General

  • Target

    06082024_1530_06082024_docs_Inv NoDFEXP2425128.docx

  • Size

    179KB

  • Sample

    240806-sxrf7asfnq

  • MD5

    64ec8c514f821c59a40574ccccb0864a

  • SHA1

    fe582f837d192c73afb71a77ccc892cb3b3bf431

  • SHA256

    76262923cb11013cf39a9483dd366230926a4349d61941c0f23989a33e3a37e9

  • SHA512

    6bfaa88106f616fdea1b5c2695ef6b64d4c76659d293aefc9d4d15c0d8eee5c8e6106b3bb81a7111c189e157738491d592996563a417cf372eab0eb1c5a8301f

  • SSDEEP

    3072:OiY5rj1ATug+mhTZMxjcFQ9csn4qAzYjDp/shKuikycBSRjR/Vx7XUAVdI:05r/g+qZMpcFSQzYHut4dFLI

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    elmxtudhengkzwgc

Targets

    • Target

      06082024_1530_06082024_docs_Inv NoDFEXP2425128.docx

    • Size

      179KB

    • MD5

      64ec8c514f821c59a40574ccccb0864a

    • SHA1

      fe582f837d192c73afb71a77ccc892cb3b3bf431

    • SHA256

      76262923cb11013cf39a9483dd366230926a4349d61941c0f23989a33e3a37e9

    • SHA512

      6bfaa88106f616fdea1b5c2695ef6b64d4c76659d293aefc9d4d15c0d8eee5c8e6106b3bb81a7111c189e157738491d592996563a417cf372eab0eb1c5a8301f

    • SSDEEP

      3072:OiY5rj1ATug+mhTZMxjcFQ9csn4qAzYjDp/shKuikycBSRjR/Vx7XUAVdI:05r/g+qZMpcFSQzYHut4dFLI

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Abuses OpenXML format to download file from external location

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks