General

  • Target

    New Order.doc

  • Size

    639KB

  • Sample

    240928-g28eqa1crk

  • MD5

    8e6d90f75e321a2a164fcb417dfce456

  • SHA1

    a5210f5280396d3fe9b98262c00b94c5b111d2a6

  • SHA256

    fcde1a9f1b5ebaaca80704a3b8b1de31bcea199cb1e935748c5e87a7264cd948

  • SHA512

    b9b998b02847442a92c48ae0c066f74ca472a67cfa44e554d587bef883eb4466d6818c6020f98731f9c0db0160927bbd2a70d23ee5411c4b2b8674fb3c2e6308

  • SSDEEP

    3072:OwAlawAlnoAzG9swFSQjkbYArXuFHkcDtQX4I8f1/:OwAYwAuAzwPSQjkbYA6F5tQX4I8f1/

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7013350856:AAEMW-L9OH6xJPBSHadxtnabC3gFbH_e250/sendMessage?chat_id=7239159003

Targets

    • Target

      New Order.doc

    • Size

      639KB

    • MD5

      8e6d90f75e321a2a164fcb417dfce456

    • SHA1

      a5210f5280396d3fe9b98262c00b94c5b111d2a6

    • SHA256

      fcde1a9f1b5ebaaca80704a3b8b1de31bcea199cb1e935748c5e87a7264cd948

    • SHA512

      b9b998b02847442a92c48ae0c066f74ca472a67cfa44e554d587bef883eb4466d6818c6020f98731f9c0db0160927bbd2a70d23ee5411c4b2b8674fb3c2e6308

    • SSDEEP

      3072:OwAlawAlnoAzG9swFSQjkbYArXuFHkcDtQX4I8f1/:OwAYwAuAzwPSQjkbYA6F5tQX4I8f1/

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks