General

  • Target

    13092024041311092024quotation.pdf.gz

  • Size

    528KB

  • Sample

    240913-vb7bmaxenp

  • MD5

    e8586c8d81fd2f08da342f2ec38b4b44

  • SHA1

    e29172a542e06793eb60b3d30b88bd0063330d92

  • SHA256

    7b066ceeb76489b6ee174bde0247e50f335338d12a68001b483f8dc7fa487cbe

  • SHA512

    50086622ec4bf03e5c10b1e8f99aebf467012270e99a8b7c81c720bcfa0b895bc83cc07b56cb189cf786be24780773a631d0fe4a670b95f79760fec5f5b998ab

  • SSDEEP

    12288:3MWfk0B+UJmVzfOyhSmUNq8OEr8dZkkl2lVcrGfmasrJB:3RPs1OyImUq8OEr623by/

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6086388911:AAGHpITQe4oLJhzRR86O2JB3Tmd1xG2gIqM/sendMessage?chat_id=1932526247

Targets

    • Target

      quotation.pdf.exe

    • Size

      584KB

    • MD5

      cae995edd90312264f9faa534874894f

    • SHA1

      2a71f016765dc5fa825ca1f437e1df02c32611a0

    • SHA256

      5226c6707f7f1430f49c6c7cd637375b00004be37d815d82804257a8ca563841

    • SHA512

      6bd8c914fbdc8b04bdf12a8a60eb61324e4e06dfdd7525d29418c861247dda366e367992afd4d285a15b8ca71df5d28ddc1056cb91df3d9d1461c888bce8d594

    • SSDEEP

      12288:HrLfSC/W39Rfyyii2nYUNm8AEr8aNZibViwt5XHF:LLbcyyii2nYUm8AErTsiw5V

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks