General

  • Target

    PackingListU0190219xlsx.gz

  • Size

    5KB

  • Sample

    240913-ysy85awfnh

  • MD5

    103997c53d6f70ffeb14fe6199d744a8

  • SHA1

    7bd1c703352c395f19b94e47039ecbbecc4ed490

  • SHA256

    ca33bd5e2218c80c2d4f17bfc53f3b187541f519e459e01e1d013862c7dcd4bb

  • SHA512

    715b333fb7d60891ff0211fdadb12bc644df57ff257e1fb3b42a7d8d7afa2895d426554f8a09dec8683e83f9cf936fca622ad20f1698066ccc505f4f5e098d0d

  • SSDEEP

    96:Gj819AVgHLhqlvooEuw7aq8sS22lr/8x0AEkQWEPmtK1kcGsclCkYdFG0HTrSyD9:Gj8si9qlwhtajsSxlFXGEv1kcGjeG0H1

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      PackingListU0190219xlsx.vbe

    • Size

      14KB

    • MD5

      48d02287f3c633ccf96c6f01acd5ca9f

    • SHA1

      2ad6405243f648937727731608d638c495b2fe46

    • SHA256

      e575a3ecc136ad114643bbd7beb2ffc3d5550fa66955bd2c8f4ef4394e11dc87

    • SHA512

      4835bb0f03bfb204e3aba46957af08f02889f7b43c60017151eafc479ba47e6ab50f6caec9cbb07cce4a6a600e6f7c576068d300e65bf762d7cf3cc59673d3c7

    • SSDEEP

      384:GA79Z5lXWUBFplgtfcQ///y+KAhxF2asn:Go5lXH9atx//N/TIn

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks